The built-in Python function eval()
is used to evaluate Python expressions. You can pass a string containing Python, or a pre-compiled object into eval()
and it will run the code and return the result.
Although Python’s eval()
is an incredibly useful tool, the function has some important security implications that you should consider before using it. In this course, you’ll learn how eval()
works and how to use it safely and effectively in your Python programs.
In this tutorial, you’ll learn:
eval()
workseval()
to dynamically evaluate arbitrary string-based or compiled-code-based inputeval()
can make your code insecure and how to minimize the associated security risksThe code in this course was tested with Python 3.9.0, eval()
has not changed much and older versions should be compatible.
What’s Included:
Downloadable Resources:
Related Learning Paths:
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4