diff options
author | Jeremy Evans <code@jeremyevans.net> | 2019-10-04 08:44:33 -0700 |
---|---|---|
committer | Jeremy Evans <code@jeremyevans.net> | 2019-11-18 01:00:25 +0200 |
commit | 3a0de05beeb997ec77d35755d9d303e1ca858cb7 (patch) | |
tree | ba9ed22e11dff9e6c25e5a97db3b2f2e8b570064 /doc/security.rdoc | |
parent | c257303ae78d0e307a80dbe5ccd405abc6e8d44d (diff) | |
download | ruby-3a0de05beeb997ec77d35755d9d303e1ca858cb7.tar.gz |
Remove mention of $SAFE and taint from doc [ci skip]
Diffstat (limited to 'doc/security.rdoc')
-rw-r--r-- | doc/security.rdoc | 13 |
1 files changed, 0 insertions, 13 deletions
diff --git a/doc/security.rdoc b/doc/security.rdoc index d7d6464ce1..ae20ed30fa 100644 --- a/doc/security.rdoc +++ b/doc/security.rdoc @@ -15,19 +15,6 @@ mailto:security@ruby-lang.org ({the PGP public key}[https://www.ruby-lang.org/security.asc]), which is a private mailing list. Reported problems will be published after fixes. -== <code>$SAFE</code> - -Ruby provides a mechanism to restrict what operations can be performed by Ruby -code in the form of the <code>$SAFE</code> variable. - -However, <code>$SAFE</code> does not provide a secure environment for executing -untrusted code. - -If you need to execute untrusted code, you should use an operating system level -sandboxing mechanism. On Linux, ptrace or LXC can be used to sandbox -potentially malicious code. Other similar mechanisms exist on every major -operating system. - == +Marshal.load+ Ruby's +Marshal+ module provides methods for serializing and deserializing Ruby |