| [reply] [d/l] |
| [reply] |
To the best of my knowledge, much of this is an urban legend. Ken mentioned that he had thought of the idea but never actually implemented any of it. It would make very interesting code to read. How does a C compiler reliably reconize that it is compiling a "login" program and then determine where to insert the alternate password code? The second hack seems even more daunting of a challenge.
| [reply] |
Right... not only do you need authentication of the author, but you also need 'correctness' - a warm fuzzy that other users have approved of the code, that it has no bugs / viruses attached. (If it was to be implemented, it could be a warm fuzzy factor sort of like xp here on pm for the correctness of the code...)
----
Zak
| [reply] |
Perhaps CPAN-6 will include a discussion forum for each module, too.
| [reply] |
Since Perl is shipped as source code, one can look at it and see if it's evil.
In theory, one can certainly do that. But is it practical?
I really wish it would, because then everyone could be a
Perl porter! Perl is installed by tens of thousands of
people. I'd be surprised if even 5 checked the source to
see whether it has some nasty "easter eggs". For modules,
it might be a little easier to check (because it's less code),
but still, it's not practical at all. Not only do you need
to check the module, but also the makefile and the test program(s).
-- Abigail | [reply] |