Replies: 2 comments 11 replies
-
why do you think instead of starting with shell/bash we could use https://github.com/babashka/babashka? |
Beta Was this translation helpful? Give feedback.
-
Definity not a good idea for production, but probably a good one for local open source users, who are only doing local tests, with no dangerous side-effects. In that case, I fail to see the possible usecase advantages to running shell scripts, instead of a dynamic clojure script in the response body, or as the webhook trigger. Anyways, is there ways to prevent malicious execution? I know we can disable this feature on our production servers, but it won't stop other users from enabling it without understand the consequences. I'm thinking of something like a "child playground" shell. Or maybe, letting the webhook run only files in the classpath, which were previously selected by the user. |
Beta Was this translation helpful? Give feedback.
-
Today we do not grant access to the file system for executing binaries or scripts, would this be an interesting feature for the open source version of moclojer?
Reference https://github.com/adnanh/webhook
Beta Was this translation helpful? Give feedback.
All reactions