Outlore
Home
Blog
Sandbox untrusted user code in JavaScript
Good for IDEs, interactive magazines etc.
Dec 21, 2023
Last updated on
Dec 24, 2023
Findings
Extism
Your JS plugin is compiled to WASM
In your runtime, you load the plugin, provide it your user’s code as an argument, and it is executed in the WebAssembly sandbox
Example:
https://www.val.town/v/nilslice/md2html
Related, see
quickjs-emscripten
Deno Subhosting
Create a deployment with your user’s code
Interface with it via HTTP