README 1.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142
  1. -*- outline -*-
  2. * Overview
  3. This directory includes examples which show how to create and use safe
  4. environments for safe (sand-boxed) execution of Scheme programs.
  5. *Note* that the files in this directory are only suitable for
  6. demonstration purposes, if you have to implement safe evaluation
  7. mechanisms in important environments, you will have to do more than
  8. shown here -- for example disabling input/output operations.
  9. The descriptions below assume that you have a working copy of Guile
  10. installed and available with the standard installation prefix
  11. `/usr/local'.
  12. * Included Examples
  13. ** safe
  14. The main program, which executes the Scheme code in a file given on
  15. the command line in a safe environment. The following command will
  16. do that with the file `untrusted.scm' (see below.)
  17. $ ./safe untrusted.scm
  18. or
  19. guile -s safe untrusted.scm
  20. ** untrusted.scm
  21. This file contains some Scheme code, which will be executed in a
  22. safe environment by the `safe' script.
  23. ** evil.scm
  24. This file also contains Scheme code, but it tries to do evil things.
  25. Evaluating this with the `safe' script will abort on those evil
  26. actions.