Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Actually, since it runs inside a WASM sandbox, even if the untrusted code overwrites built-ins like map or modifies globals(), it only affects its own isolated memory space. It cannot escape the WASM container or affect the host system




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: