We don't bite newbies here... much | |
PerlMonks |
comment on |
( [id://3333]=superdoc: print w/replies, xml ) | Need Help?? |
If I understand your post right, you want to use Perl to stop buffer overflow or other vulnerabilities in unrelated binaries. If that's right, then as I see it, you either run said binaries and Perl pipes input to them, as you demonstrate. Or have Perl spawn them (e.g. via a system) but within a special sandbox (this is very abstract, I am not sure how to do that). The latter case is interesting because it can check the binary for vulnerabilities before spawning it. Like here: https://stackoverflow.com/a/8783198 . In fact, there must be a tool already for scanning executables or source code for such vulnerabilities, given all this "AI" hype, even if very mechanistic and limited. For one, gcc warns me about copying larger data onto fixed-size arrays. bw, bliako In reply to Re: Greetings and salutations | sudo
by bliako
|
|