Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Note: there can always be problems of data exfiltration or compute power theft (as part of a botnet or mining), so owning the machine is not the only risk to mitigate.


Both great points! Extism docs assume some level of familiarity with the security model of WebAssembly. Which unless you grant it granular permission, does mitigate the risks you’ve mentioned.

I agree we should do more to specifically call out these security benefits - and also how a user could impact that default security.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: