You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
IO_Unpickle using EvalString means that a malicious data file can perform arbitrary code execution. Part of me feels this is a bad thing, and it might be worth putting the work in to remove the evals. However GAP might already be such a leaky sieve that this ship has sailed!
Interested in opinions.
The text was updated successfully, but these errors were encountered:
I think we should indeed try to avoid using EvalString; not just for security reasons but also for general robustness and reproducibility reasons.
Of course overall, there are probably tons and tons of places in GAP that you could use for an exploit. But that shouldn't be an excuse for leaving unsafe code in... ;-). On the plus side, as long as you don't run GAP as a special privileged user, and don't expose it externally, I see little harm coming that way. Of course, if one wants to offer access to GAP via e.g. a webfront (similar to what Sage and polymake offer), this might be a bit different.
IO_Unpickle using EvalString means that a malicious data file can perform arbitrary code execution. Part of me feels this is a bad thing, and it might be worth putting the work in to remove the evals. However GAP might already be such a leaky sieve that this ship has sailed!
Interested in opinions.
The text was updated successfully, but these errors were encountered: