From: Daniel Ruf Date: Wed, 30 Oct 2024 00:36:18 +0000 (+0100) Subject: gh-118633: Add warning regarding the unsafe usage of eval and exec (GH-118437) X-Git-Tag: v3.14.0a2~248 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=00e5ec0d35193c1665e5c0cfe5ef82eed270d0f4;p=thirdparty%2FPython%2Fcpython.git gh-118633: Add warning regarding the unsafe usage of eval and exec (GH-118437) * Add warning regarding the unsafe usage of eval * Add warning regarding the unsafe usage of exec * Move warning under parameters table * Use suggested shorter text Co-authored-by: Jelle Zijlstra * Use suggested shorter text Co-authored-by: Jelle Zijlstra * Improve wording as suggested --------- Co-authored-by: Kirill Podoprigora Co-authored-by: Jelle Zijlstra --- diff --git a/Doc/library/functions.rst b/Doc/library/functions.rst index 290c63827ff7..5c0efd21318f 100644 --- a/Doc/library/functions.rst +++ b/Doc/library/functions.rst @@ -594,6 +594,11 @@ are always available. They are listed here in alphabetical order. :returns: The result of the evaluated expression. :raises: Syntax errors are reported as exceptions. + .. warning:: + + This function executes arbitrary code. Calling it with + user-supplied input may lead to security vulnerabilities. + The *expression* argument is parsed and evaluated as a Python expression (technically speaking, a condition list) using the *globals* and *locals* mappings as global and local namespace. If the *globals* dictionary is @@ -650,6 +655,11 @@ are always available. They are listed here in alphabetical order. .. function:: exec(source, /, globals=None, locals=None, *, closure=None) + .. warning:: + + This function executes arbitrary code. Calling it with + user-supplied input may lead to security vulnerabilities. + This function supports dynamic execution of Python code. *source* must be either a string or a code object. If it is a string, the string is parsed as a suite of Python statements which is then executed (unless a syntax error