<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Nabeel Parkar</title>
    <description>The latest articles on DEV Community by Nabeel Parkar (@exabyt3).</description>
    <link>https://dev.to/exabyt3</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F279903%2F0cd0a1e3-1f24-4c36-b3d3-fc7d5757b814.jpg</url>
      <title>DEV Community: Nabeel Parkar</title>
      <link>https://dev.to/exabyt3</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/exabyt3"/>
    <language>en</language>
    <item>
      <title>What are python modules that can be used to potentially write malicious code?</title>
      <dc:creator>Nabeel Parkar</dc:creator>
      <pubDate>Sat, 01 Feb 2020 06:46:41 +0000</pubDate>
      <link>https://dev.to/exabyt3/what-are-python-modules-that-can-be-used-to-potentially-write-malicious-code-3cic</link>
      <guid>https://dev.to/exabyt3/what-are-python-modules-that-can-be-used-to-potentially-write-malicious-code-3cic</guid>
      <description>&lt;p&gt;I am trying to make a website what allows users to run python code. I've got the code part and running it down but there a matter of security too. I know that the os module and the fs module can be used to alter the actual server and this is something that shouldn't be allowed. Other than these modules, what are other modules what I can filter out and print a message to the user telling them that these keywords should not be used?&lt;/p&gt;

</description>
      <category>python</category>
    </item>
  </channel>
</rss>
