logoalt Hacker News

dnauticsyesterday at 6:37 PM0 repliesview on HN

What is your attack model here? Each request lives in its own arena allocator, so there is no way for any potentially malicious JavaScript to escape and read memory owned by any other request, even if there is a miscode. otherwise, VM safety is delegated to the V8 core.