Tom Lane wrote:
> Robert Haas <robertmhaas(at)gmail(dot)com> writes:
>> So... can we get back to coming up with a reasonable
>> definition,
>
> (1) no access to system calls (including file and network I/O)
If a PL has file access to it's own sandbox (similar to what
flash seems to do in web browsers), could that be considered
trusted?