building an online judge to evaluate Python programs

Ned Batchelder ned at nedbatchelder.com
Mon Sep 23 09:20:06 EDT 2013


On 9/23/13 8:33 AM, Fábio Santos wrote:
>
>
> On 20 Sep 2013 21:14, "Jabba Laci" <jabba.laci at gmail.com 
> <mailto:jabba.laci at gmail.com>> wrote:
> >
> > > That last seems to me to be the biggie.  Several times in the past few
> > > years, people in this mailing list have tried to build a safe sandbox.
> > > And each one was a big failure, for a hacker of sufficient interest.
> > > Some of them were spectacular failures.
> > >
> > > If you have to be safe from your user, Python may be the wrong 
> language
> > > to give them.
> >
> > Well, the course is about Python and I want to test Python scripts...
> >
> > I've heard about "chroot jail" but I never used it. Wikipedia says:
> >
> > "A chroot on Unix operating systems is an operation that changes the
> > apparent root directory for the current running process and its
> > children. A program that is run in such a modified environment cannot
> > name (and therefore normally not access) files outside the designated
> > directory tree. The term "chroot" may refer to the chroot(2) system
> > call or the chroot(8) wrapper program. The modified environment is
> > called a "chroot jail"."
> >
> > I guess it could be used for sandboxing.
> >
> > Laszlo
>
> It may be a good start to whitelist the modules and builtins they are 
> allowed to use.
>
> The ast module could be used to scan the source tree for import 
> statements and run the imported modules through the whitelist.
>
> There should also be many ways to run a script with stripped-down 
> builtins.
>
> Then you can control execution time and memory usage using an external 
> tool.
>
> I'm quite sure this isn't all you need, but it can be a good place to 
> start.
>
>

Python really is too dynamic for any static analysis like this to help 
in the long run.  It will stop people from doing the obvious things, but 
there will always be a way to circumvent it.  Take a look here:  Eval 
really is dangerous: 
http://nedbatchelder.com/blog/201206/eval_really_is_dangerous.html

If you want to run untrusted Python code and prevent malice (or 
stupidity) from harming you, you need OS-level protection.

--Ned.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.python.org/pipermail/python-list/attachments/20130923/304f3aba/attachment.html>


More information about the Python-list mailing list