json-editor
proposal-compartments
json-editor | proposal-compartments | |
---|---|---|
1 | 1 | |
5,791 | 111 | |
- | 0.0% | |
10.0 | 10.0 | |
about 6 years ago | over 1 year ago | |
JavaScript | HTML | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
json-editor
proposal-compartments
-
Show HN: Run unsafe user generated JavaScript in the browser
There's a related proposal for Compartments and Module constructor is a prerequisite to that. A shim for the entire thing exists, with lockdown and Compartments isolating code:
https://github.com/endojs/endo/tree/master/packages/ses
https://github.com/tc39/proposal-compartments/
It has usage already, eg. metamask snaps
What are some alternatives?
caja - Caja is a tool for safely embedding third party HTML, CSS and JavaScript in your website.
jailed - execute untrusted code with custom permissions
determine-basal-native
workerbox - A secure sandbox to execute untrusted user JavaScript, in a web browser, without any risk to your own domain/site/page.
vm2-process - Execute unsafe javascript code in a sandbox
SES-shim - Endo is a distributed secure JavaScript sandbox, based on SES
quickjs-emscripten - Safely execute untrusted Javascript in your Javascript, and execute synchronous code that uses async functions
Pentive - Collaborative Spaced Repetition