aboutsummaryrefslogtreecommitdiffstats
path: root/doc/security.rdoc
diff options
context:
space:
mode:
authorJeremy Evans <code@jeremyevans.net>2019-10-04 08:44:33 -0700
committerJeremy Evans <code@jeremyevans.net>2019-11-18 01:00:25 +0200
commit3a0de05beeb997ec77d35755d9d303e1ca858cb7 (patch)
treeba9ed22e11dff9e6c25e5a97db3b2f2e8b570064 /doc/security.rdoc
parentc257303ae78d0e307a80dbe5ccd405abc6e8d44d (diff)
downloadruby-3a0de05beeb997ec77d35755d9d303e1ca858cb7.tar.gz
Remove mention of $SAFE and taint from doc [ci skip]
Diffstat (limited to 'doc/security.rdoc')
-rw-r--r--doc/security.rdoc13
1 files changed, 0 insertions, 13 deletions
diff --git a/doc/security.rdoc b/doc/security.rdoc
index d7d6464ce1..ae20ed30fa 100644
--- a/doc/security.rdoc
+++ b/doc/security.rdoc
@@ -15,19 +15,6 @@ mailto:security@ruby-lang.org ({the PGP public
key}[https://www.ruby-lang.org/security.asc]), which is a private mailing list.
Reported problems will be published after fixes.
-== <code>$SAFE</code>
-
-Ruby provides a mechanism to restrict what operations can be performed by Ruby
-code in the form of the <code>$SAFE</code> variable.
-
-However, <code>$SAFE</code> does not provide a secure environment for executing
-untrusted code.
-
-If you need to execute untrusted code, you should use an operating system level
-sandboxing mechanism. On Linux, ptrace or LXC can be used to sandbox
-potentially malicious code. Other similar mechanisms exist on every major
-operating system.
-
== +Marshal.load+
Ruby's +Marshal+ module provides methods for serializing and deserializing Ruby