ABS 1.3.0: interactive shell commands bring more productivity to the language

A couple weeks ago the ABS team managed to pull together a new minor release of the language, 1.3.0. This new release only adds 2 new features, but we believe one of them (interactive commands) is money!

Interactive commands via exec(…)

Interactive commands allow you throw the user into their preferred shell while running an ABS script (even within the ABS repl).

An asciinema is worth a thousand words:

asciicast

The syntax is very simple: just call the exec function with the command you want to run as the only argument, such as exec("vi /etc/hosts"). IO is left to the user so ABS will not try to meddle with that — it’s all yours!

for…else

We added the ability to specify an else block in a for loop!

This feature is inspired by the jinja template engine and allows to run code when the list you’re iterating over is empty:

1
2
3
4
5
6
7
8
9
10
11
12
13
for x in flag("test").split(",").filter(f(e) { e.int() != 1 }) {
    echo(x)
} else {
    echo("No elements provided")
}

# $ abs script.abs --test 1,2,3,4
2
3
4

# $abs script.abs --test 1,1,1,1
No elements provided

Now what?

Install ABS with a simple one-liner:

1
bash <(curl https://www.abs-lang.org/installer.sh)

…and start scripting like it’s 2019!

PS: Again, many thanks to Erich, who’s been taking a larger role as the weeks have gone by — interactive commands were his idea, and he took care of implementing them from A to the Z!

I would also like to thank Ming who already helped ABS with a few contributions in the past, and was responsible for for...else in this release!

See you next time!


Hi there! I recently wrote an ebook on web application security, currently sold on leanpub, the Amazon Kindle store and gumroad.

It contains 160+ pages of content dedicated to securing web applications and improving your security awareness when building web apps, with chapters ranging from explaining how to secure HTTP cookies with the right flags to understanding why it is important to consider joining a bug bounty program.

Feel free to skim through some of the free chapters published on this blog and, if the content seems interesting enough to you, grab a copy on leanpub, the Amazon Kindle store, gumroad or simply checkout right down below!

Buy the Web Application Security ebook for $9.99

In the mood for some more reading?

...or check the archives.