Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The usual stuff with C and C++.

WebAssembly doesn't do bounds checking, besides being in bounds of a linear memory segment.

Basically the access is still in bounds of the allocated memory, but not the cells that one actually wanted to access.

From security point of view, while the WebAssembly module is sandboxes, such corruptions can be triggered from the outside, changing the behaviour of the public API.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: