TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Python Isolation System (enables live scripting)

1 pointsby onespherealmost 2 years ago

1 comment

onespherealmost 2 years ago
This is a variation of an identity-centric security context for POSIX-based web platforms, which specifies containerization strategy of Python-targeted code.<p>Idea: run executable processes with impersonated user privilege, encapsulated as a function call:<p><pre><code> from encapsulate import exeCallObject, keyword def run(): try: return exeCallObject \ (&#x27;assets&#x2F;Itham&#x2F;services&#x2F;component&#x2F;query&#x27;, keyword(&#x27;keyword&#x27;, &#x27;value&#x27;), &#x27;arg1&#x27;, &#x27;arg2&#x27;, &#x27;arg3&#x27;, compartmentalize = True) except exeCallObject.error as e: return namespace(code = e.returncode, error = e.stderrOutput, output = e.stdOutput) </code></pre> Or:<p><pre><code> encapsule.isolate --post-context assets&#x2F;Itham&#x2F;services&#x2F;component&#x2F;query \ --keyword=value arg1 arg2 arg3 \ | wget &#x27;https:&#x2F;&#x2F;network&#x2F;channel&#x2F;x&#x27; --method=post --post-file=- </code></pre> Additional implementation is available online at: <a href="https:&#x2F;&#x2F;thetaplane.com" rel="nofollow noreferrer">https:&#x2F;&#x2F;thetaplane.com</a>