<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=us-ascii">
<META content="MSHTML 6.00.2800.1528" name=GENERATOR></HEAD>
<BODY>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN class=449072412-20022006>No -
javascript is executed on the client - never the server. Nothing you can do on
the client can damange the sever</SPAN></FONT></DIV>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN
class=449072412-20022006>*provided* the server code is safely
compiled.</SPAN></FONT></DIV>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN
class=449072412-20022006></SPAN></FONT> </DIV>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN class=449072412-20022006>I
guess I omitted to say that in my "safe" mode of compilation *everything* is
compiled with a safety wrapper (ie including</SPAN></FONT></DIV>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN class=449072412-20022006>BIFs)
- thus </SPAN></FONT></DIV>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN
class=449072412-20022006></SPAN></FONT> </DIV>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN
class=449072412-20022006> apply(M, F, A) is transformed to
safe:do(erlang, apply, [M,F,A])</SPAN></FONT></DIV>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN
class=449072412-20022006></SPAN></FONT> </DIV>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN
class=449072412-20022006>and</SPAN></FONT></DIV>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN
class=449072412-20022006> </SPAN></FONT></DIV>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN class=449072412-20022006>
list_to_atom(X) to safe:do(erlang, list_to_atom, [X])</SPAN></FONT></DIV>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN
class=449072412-20022006> </SPAN></FONT></DIV>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN
class=449072412-20022006> Then safe:do/3 can be written with any
policy you like - to enable or disable more or less risky
operations</SPAN></FONT></DIV>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN
class=449072412-20022006></SPAN></FONT> </DIV>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN
class=449072412-20022006>/Joe</SPAN></FONT></DIV>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN
class=449072412-20022006></SPAN></FONT> </DIV><FONT face=Arial
color=#0000ff size=2></FONT><BR>
<BLOCKQUOTE
style="PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #0000ff 2px solid; MARGIN-RIGHT: 0px">
<DIV class=OutlookMessageHeader lang=en-us dir=ltr align=left>
<HR tabIndex=-1>
<FONT face=Tahoma size=2><B>From:</B> owner-erlang-questions@erlang.org
[mailto:owner-erlang-questions@erlang.org] <B>On Behalf Of </B>Alex
Arnon<BR><B>Sent:</B> den 20 februari 2006 12:49<BR><B>To:</B>
erlang-questions@erlang.org<BR><B>Subject:</B> Re: Jaws - coming soon -
testers and advice wanted<BR></FONT><BR></DIV>
<DIV></DIV>Could the Javascript apply(...) binding cause new atoms to be
created? In that case, wouldn't that constitute a security
hazard?<BR><BR></BLOCKQUOTE></BODY></HTML>