Paul Shirley <paul.shirley@xxxxxxxxxxxx> wrote:The 'jump to error' support would make a good attack target for this (with a few gratuitous syntax errors in source packages)Compile_Default_Compiler only has an effect on the regular expressions used when parsing compiler output. The variables to worry about are those that determine what programs get run via, e.g., shell_cmd, etc. For example, XTerm_Pgm in runpgm.sl is one such variable.
Sorry, wasn't commenting on any specific action but observing that doing a 'compile,jump_to_error' would load a file and jump straight past the header. Its a very plausible way to exploit the security hole.
-- Paul Shirley -------------------------- To unsubscribe send email to <jed-users-request@xxxxxxxxxxx> with the word "unsubscribe" in the message body. Need help? Email <jed-users-owner@xxxxxxxxxxx>.