Improving Nova privilege escalation model, part 3
In the previous two posts of this series, we explored the deficiencies of the current model and the features of an alternative implementation. In this last post, we'll discuss the advantages of a Python implementation and open discussion on how to secure it properly.
Python implementation
It's quite easy to …