logoalt Hacker News

ushakovtoday at 1:23 AM0 repliesview on HN

best answer is probably to have a layered approach - use this to limit what the generated code can do, wrap it in a secure VM to prevent leaking out to other tenants.