Running in a Restricted Environment

Imagine that you decided to create an online game in which players from all over the world would upload virtual robots to traverse a maze and destroy one another. Not only did you decide to implement most of the game in Python, you chose to let the players program their robots using Python too. One problem, though, is that a malicious entrant could include code to erase files on your computer, install a Trojan horse, or cause damage in any number of other ways. How could you deal with that danger?

0 0

Post a comment