logoalt Hacker News

attila-lendvailast Sunday at 11:08 PM0 repliesview on HN

you don't need to call eval for the usual config file setup, only read.

(but you often get something much better when config files are plain lisp code; i.e. they are eval'ed, assuming that the threat model allows it)