in reply to Re: Intercepting compile time blocks like BEGIN {}
in thread Intercepting compile time blocks like BEGIN {}
> ...
I'm aware of this, but thats exactly why I was describing a call-back function to control the process.
For instance the filepath could be taken to make a distinction between trusted and new code.
And rurban's suggestion to wrap the code into a Safe environment could be chosen to allow execution of BEGIN blocks in untrusted code.
> EPIC uses PPI to parse the script without executing anything.
Tell me, PPI can find BEGIN-Blocks like in ''=~('(?{B'.'EGIN{print "owned"}})') ?
AFAIK PPI can not deal with all kinds of syntax changing mechanisms. So wouldn't be of much help when searching for evil code, since attackers could use these limitations.
Cheers Rolf
|
---|
Replies are listed 'Best First'. | |
---|---|
Re^3: Intercepting compile time blocks like BEGIN {}
by ikegami (Patriarch) on Aug 09, 2010 at 22:00 UTC | |
by LanX (Saint) on Aug 09, 2010 at 22:04 UTC | |
by ikegami (Patriarch) on Aug 09, 2010 at 23:13 UTC | |
by LanX (Saint) on Aug 09, 2010 at 23:46 UTC | |
by ikegami (Patriarch) on Aug 10, 2010 at 01:10 UTC |