[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
at risk
From: |
Andreas Röhler |
Subject: |
at risk |
Date: |
Sat, 15 Jun 2013 13:54:39 +0200 |
User-agent: |
Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130510 Thunderbird/17.0.6 |
When execution might rely on variables set by user, resp. at a later time, such
a function should preferably not be used by programs, i.e.
in circumstances being with some probability not aware of the changed
proceeding.
This is the case for example with `forward-sexp', which might be taken by
`forward-sexp-function'.
Please consider bug#14611. Being concerned a certain amount of code is set
already at risk that way.
Thanks,
Andreas
- at risk,
Andreas Röhler <=