Following #6 we did some research, and the only way to prevent arbitrary code execution is to use only plain text parsing. JSON, XML, or your own format.
Anything that could potentially parse resources, like str2var, ConfigFile, or resources, can execute code. Except for bytestovar and vartobytes, which have extra safety because they're used for networking.
We should update examples and the demo's readme accordingly.
Following #6 we did some research, and the only way to prevent arbitrary code execution is to use only plain text parsing. JSON, XML, or your own format.
Anything that could potentially parse resources, like str2var, ConfigFile, or resources, can execute code. Except for bytestovar and vartobytes, which have extra safety because they're used for networking.
We should update examples and the demo's readme accordingly.