logoalt Hacker News

Retr0idtoday at 12:52 AM1 replyview on HN

I'm enjoying watching the battle for where to draw the sandbox boundaries (and I don't have any answers, either!)


Replies

ushakovtoday at 1:23 AM

best answer is probably to have a layered approach - use this to limit what the generated code can do, wrap it in a secure VM to prevent leaking out to other tenants.