From mboxrd@z Thu Jan 1 00:00:00 1970 From: Bastien Subject: Re: depending TODOs, scheduling following TODOs automatically Date: Tue, 09 Oct 2007 11:35:59 +0100 Message-ID: <871wc4lgmo.fsf@bzg.ath.cx> References: <6dbd4d000710080626i52f0f0t9354addc33c0efee@mail.gmail.com> <20071008134353.GA10774@odin.demosthenes.org> <877ilxmimn.fsf@bzg.ath.cx> <20071008202652.GA18426@atlantic.linksys.moosehall> <87k5pxnicj.fsf@bzg.ath.cx> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Return-path: Received: from mailman by lists.gnu.org with tmda-scanned (Exim 4.43) id 1IfBVU-00026W-Vx for emacs-orgmode@gnu.org; Tue, 09 Oct 2007 05:36:05 -0400 Received: from exim by lists.gnu.org with spam-scanned (Exim 4.43) id 1IfBVS-00024n-IN for emacs-orgmode@gnu.org; Tue, 09 Oct 2007 05:36:04 -0400 Received: from [199.232.76.173] (helo=monty-python.gnu.org) by lists.gnu.org with esmtp (Exim 4.43) id 1IfBVS-00024e-9o for emacs-orgmode@gnu.org; Tue, 09 Oct 2007 05:36:02 -0400 Received: from ug-out-1314.google.com ([66.249.92.168]) by monty-python.gnu.org with esmtp (Exim 4.60) (envelope-from ) id 1IfBVS-0005jf-0w for emacs-orgmode@gnu.org; Tue, 09 Oct 2007 05:36:02 -0400 Received: by ug-out-1314.google.com with SMTP id m4so62351uge for ; Tue, 09 Oct 2007 02:36:01 -0700 (PDT) In-Reply-To: (Eddward DeVilla's message of "Mon, 8 Oct 2007 22:47:11 -0500") List-Id: "General discussions about Org-mode." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: emacs-orgmode-bounces+geo-emacs-orgmode=m.gmane.org@gnu.org Errors-To: emacs-orgmode-bounces+geo-emacs-orgmode=m.gmane.org@gnu.org To: emacs-orgmode@gnu.org "Eddward DeVilla" writes: > This could be dangerous. Org file are (most) text. The more code you > allow to be embedded, the more of a vector org-mode becomes for trojan > horse attacks. Well, thinking of org-mode as a vector of trojan horse attacks sounds like science fiction to me :) Anyway, as I said, we could store the triggered actions in a pool and ask the user if he want to perform them. Of course the user would be allowed to turn a set of actions "safe" (see `safe-local-eval-forms') Not that a problem IMO. -- Bastien