▲ | CuriouslyC 3 days ago | |||||||||||||||||||||||||||||||
Deno sandboxing is paper thin, last time I looked they had very simple rules. It's a checkbox feature. If you want isolation use WASM. | ||||||||||||||||||||||||||||||||
▲ | ndjddirbrbrbfi 3 days ago | parent | next [-] | |||||||||||||||||||||||||||||||
It doesn’t have granularity in terms of what parts of the code have what permission - everything in the same process has the same permission, but aside from that I’m not sure what you mean about it being paper thin. Certainly WASM is a great option, and I think it can facilitate a more nuanced capabilities model, but for cases like this AFAIK Deno should be secure (to the extent that V8 is secure, which Chrome’s security depends on). It being a checkbox feature is a weird way to frame it too, because that typically implies you’re just adding a feature to match your competitors, but their main competitors don’t have that feature. In what ways does it fall short? If there are major gaps, I’d like to know because I’ve been relying on it (for personal projects only myself, but I’ve recommended it to others for commercial projects). | ||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||
▲ | silverwind 3 days ago | parent | prev [-] | |||||||||||||||||||||||||||||||
WASM can not run JavaScript unfortunately. | ||||||||||||||||||||||||||||||||
|