Hi Chris,
two things that have been changed with 2024 and must be considered for the future:
Python Sandbox
To avoid the execution of python commands that can call arbitrary operating system commands during file load we implemented a Python Sandbox that can be configured in the Preferences > Script dialog. By default the Sandbox is enabled and File IO, network communication and starting new processes is disabled. The Sandbox can be forced to be enabled by setting the environment variable VRED_SECURE_PYTHON. In addition it is possible to configure exceptions for Python- Modules and Functions.
Cluster Service
VRED uses the program VREDClusterService to provide access to services over the network. We have changed the Cluster Service Configuration to only allow VRED processes to access this functionality and eliminate any security vulnerabilities. As a result, the Status Page, Cluster Rendering, Cluster Manger, Cluster Queue, Server Node, Collaboration and VRPN Server is disabled/blocked by default, and a warning appears when it is enabled.
The setup tool VREDClusterSetup can be used to enable the used services and to configure, which hosts are allowed to use those services. In addition this tool can show log messages or activate and deactivate the windows service. Changes to the configuration file are immediately used after saving the file. A restart of the cluster service is not necessary.
Hope this helps
Pascal