You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,19 +25,19 @@ Those hosts then run the same codebase which is compiled to WebAssembly:
25
25
- the REPL logic
26
26
- the plugins
27
27
28
-
The plugins like `ls` or `cat` can interact with the filesystem using the primitives of the languages they are written in.
29
-
30
-
- on the CLI, a folder from the disk is mounted via the `--dir` flag
31
-
- on the browser, a virtual filesystem is mounted, the I/O operations are forwarded via the `@bytecodealliance/preview2-shim/filesystem` shim, which shims the `wasi:filesystem` filesystem interface
32
-
33
-
The CLI host `pluginlab` supports the same kinds of permissions deno introduced:
28
+
Security model: the REPL cli implements a security model inspired by [deno](https://docs.deno.com/runtime/fundamentals/security/#permissions):
34
29
35
30
-`--allow-net`: allows network access to the plugins, you can specify a list of domains comma separated (by default, no network access is allowed)
36
31
-`--allow-read`: allows read access to the filesystem
37
32
-`--allow-write`: allows write access to the filesystem
38
33
-`--allow-all`: allows all permissions (same as all the flags above), short: `-A`
39
34
40
-
This is what it means by plugins being "sandboxed by default" - you can take any plugin from anywhere, if you don't allow any access, it won't be able to make any network request or read/write to your filesystem and it will be constrained to its own part of the memory.
35
+
Plugins are sandboxed by default - they cannot access the filesystem or network unless explicitly permitted. This allows safe execution of untrusted plugins while maintaining the flexibility to grant specific permissions when needed.
36
+
37
+
Plugins like `ls` or `cat` can interact with the filesystem using the primitives of the languages they are written in.
38
+
39
+
- on the CLI, a folder from the disk is mounted via the `--dir` flag
40
+
- on the browser, a virtual filesystem is mounted, the I/O operations are forwarded via the `@bytecodealliance/preview2-shim/filesystem` shim, which shims the `wasi:filesystem` filesystem interface
Copy file name to clipboardExpand all lines: crates/pluginlab/README.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,19 +20,19 @@ Those hosts then run the same codebase which is compiled to WebAssembly:
20
20
- the REPL logic
21
21
- the plugins
22
22
23
-
The plugins like `ls` or `cat` can interact with the filesystem using the primitives of the languages they are written in.
24
-
25
-
- on the CLI, a folder from the disk is mounted via the `--dir` flag
26
-
- on the browser, a virtual filesystem is mounted, the I/O operations are forwarded via the `@bytecodealliance/preview2-shim/filesystem` shim, which shims the `wasi:filesystem` filesystem interface
27
-
28
-
The CLI host `pluginlab` supports the same kinds of permissions deno introduced:
23
+
Security model: the REPL cli implements a security model inspired by [deno](https://docs.deno.com/runtime/fundamentals/security/#permissions):
29
24
30
25
-`--allow-net`: allows network access to the plugins, you can specify a list of domains comma separated (by default, no network access is allowed)
31
26
-`--allow-read`: allows read access to the filesystem
32
27
-`--allow-write`: allows write access to the filesystem
33
28
-`--allow-all`: allows all permissions (same as all the flags above), short: `-A`
34
29
35
-
This is what it means by plugins being "sandboxed by default" - you can take any plugin from anywhere, if you don't allow any access, it won't be able to make any network request or read/write to your filesystem and it will be constrained to its own part of the memory.
30
+
Plugins are sandboxed by default - they cannot access the filesystem or network unless explicitly permitted. This allows safe execution of untrusted plugins while maintaining the flexibility to grant specific permissions when needed.
31
+
32
+
Plugins like `ls` or `cat` can interact with the filesystem using the primitives of the languages they are written in.
33
+
34
+
- on the CLI, a folder from the disk is mounted via the `--dir` flag
35
+
- on the browser, a virtual filesystem is mounted, the I/O operations are forwarded via the `@bytecodealliance/preview2-shim/filesystem` shim, which shims the `wasi:filesystem` filesystem interface
36
36
37
37
More details on the github repo: [topheman/webassembly-component-model-experiments](https://github.com/topheman/webassembly-component-model-experiments).
0 commit comments