Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

But if WASM can call JS, and JS can then interact with the DOM, then doesn't tat allow WASM to exploit security holes in the DOM?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: