I'm curious about security, there is an implementation PHP evaluatoras follows:
<?php eval($_POST['codeInput']); %>
This is due to the fact that PHP sandbox, so disinfection against DB input, etc. not a major issue.
Users destroying the server hosting the file are located.
I saw Ruby simulators, so I was curious about what is related to security (at least vague details).
Thanks to everyone. I'm not even sure which answer to accept, because they are all useful.
Owen's answer summarizes what I suspected (the server itself would be in danger).
arin answer provides an excellent example of potential problems.
Jeff's answer and randy answer reflect a common opinion that you will need to write your own evaluator to get opportunities like modeling.
source
share