Essentially without more details it simply going to be a case of people posting potential attack vectors, and you saying they don't exist within your solution. See also Re: Code hiding in Perl.
| [reply] |
perl_run(my_perl);
eval_pv(buffer, TRUE);
| [reply] [d/l] |
At the moment I don't have the time to Super Search, but I have a memory of a similar proposal made some time ago here. Given your quote below, you understand the caveats to this situation. Unless you post something that's repeatable, which would give people an opportunity to help find what you'd consider to be issues any "thoughts/suggestions/criticism" people can give may be of limited value to you.
"Ofcourse I am sure that it's almost impossible to completely secure the code from "too curious" eyes, but I tried to make things harder for them"
| [reply] |
*sigh* read all the other threads and the threads they link, getting at the source code of anyting that calls perl_run and eval_pv is trivial
| [reply] |
'I am not using Perl's eval method to do in-memory execution ...'
Then what are you using? | [reply] |