123456789101112131415161718192021222324252627282930313233343536373839404142 |
- -*- outline -*-
- * Overview
- This directory includes examples which show how to create and use safe
- environments for safe (sand-boxed) execution of Scheme programs.
- *Note* that the files in this directory are only suitable for
- demonstration purposes, if you have to implement safe evaluation
- mechanisms in important environments, you will have to do more than
- shown here -- for example disabling input/output operations.
- The descriptions below assume that you have a working copy of Guile
- installed and available with the standard installation prefix
- `/usr/local'.
- * Included Examples
- ** safe
- The main program, which executes the Scheme code in a file given on
- the command line in a safe environment. The following command will
- do that with the file `untrusted.scm' (see below.)
- $ ./safe untrusted.scm
- or
- guile -s safe untrusted.scm
- ** untrusted.scm
- This file contains some Scheme code, which will be executed in a
- safe environment by the `safe' script.
- ** evil.scm
- This file also contains Scheme code, but it tries to do evil things.
- Evaluating this with the `safe' script will abort on those evil
- actions.
|