If I understand your post right, you want to use Perl to stop buffer overflow or other vulnerabilities in unrelated binaries.
If that's right, then as I see it, you either run said binaries and Perl pipes input to them, as you demonstrate.
Or have Perl spawn them (e.g. via a system) but within a special sandbox (this is very abstract, I am not sure how to do that).
The latter case is interesting because it can check the binary for vulnerabilities before spawning it. Like here: https://stackoverflow.com/a/8783198 . In fact, there must be a tool already for scanning executables or source code for such vulnerabilities, given all this "AI" hype, even if very mechanistic and limited. For one, gcc warns me about copying larger data onto fixed-size arrays.
bw, bliako
In reply to Re: Greetings and salutations | sudo
by bliako
in thread Greetings and salutations | sudo
by zentara
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |