Eh, that was only an example how to use public exec to destructive purposes ;)
Using that kind of procedure without proper $arg checking can be really dangerous.
for example my hosts are set to the ident and exacthost and there impossible to recreate.. using hostserv :p, or you could use protected channels.. and so on and so on, its realy not that unsafe .. ifu ask me .. depends how u handle it
but i don't think he wants shell execute !exec proc .. <= to me that means he wants same thing as .tcl on partlyline but for channel..
for example my hosts are set to the ident and exacthost and there impossible to recreate.. using hostserv :p, or you could use protected channels.. and so on and so on, its realy not that unsafe .. ifu ask me .. depends how u handle it
Sure, but i still can be dangerous.
but i don't think he wants shell execute !exec proc .. <= to me that means he wants same thing as .tcl on partlyline but for channel..
I can always do:
!exec file delete -force ~/
;)
Public exec without any restrictions is too dangerous in my opinion.
as i sad before depends how u script if u bind with flag n and u set ur host to 100% strickt host then its not unsafe ex.: ident@somehost.tld realy safe don't u think !! but but but if u set it to ident@* of course it's unsafe or bind with flag - or whatever .. realy depends how u manage ur bots .. !!!!
Sure, but i still can be dangerous.
with strickt i mean exact and its impossible for someone to get the exact same host as u !! unless there behind ur computer but hey then what is the use :p
Yes, you're right, but what if someone added to +n (even with strict host) will be angry on bot owner and use this command to make a little mess (for example with "rm -fr" (file delete))? Those command should be limited in my opinion :)
he doesnt need to run rm, he could do plenty of other stuff (>, >>, && and so on) as parameter to endanger your system
this trigger is equail to a full shell access on your box (if the user knows what he's doing)