You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hello!
I have the task of enabling users to interact with our ASP.NET Core application using Python scripts. It is expected that these scripts will receive data from the ASP.NET Core application's object model, perform some computations, and then return the results back to the ASP.NET Core application.
As I understand it, Python.NET can assist me in implementing this, but the user-loaded scripts may potentially contain malicious code (for example, deleting folders and files). Could you please advise whether your library includes any mechanisms to prevent such actions or not? Perhaps you have some examples or could provide some recommendations?
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
-
Hello!
I have the task of enabling users to interact with our ASP.NET Core application using Python scripts. It is expected that these scripts will receive data from the ASP.NET Core application's object model, perform some computations, and then return the results back to the ASP.NET Core application.
As I understand it, Python.NET can assist me in implementing this, but the user-loaded scripts may potentially contain malicious code (for example, deleting folders and files). Could you please advise whether your library includes any mechanisms to prevent such actions or not? Perhaps you have some examples or could provide some recommendations?
Beta Was this translation helpful? Give feedback.
All reactions