Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

you don't need to call eval for the usual config file setup, only read.

(but you often get something much better when config files are plain lisp code; i.e. they are eval'ed, assuming that the threat model allows it)





Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: