В России ответили на имитирующие высадку на Украине учения НАТО18:04
The performance characteristics are attractive with incredibly fast cold starts and minimal memory overhead. But the practical limitation is language support. You cannot run arbitrary Python scripts in WASM today without compiling the Python interpreter itself to WASM along with all its C extensions. For sandboxing arbitrary code in arbitrary languages, WASM is not yet viable. For sandboxing code you control the toolchain for, it is excellent. I am, however, quite curious if there is a future for WASM in general-purpose sandboxing. Browsers have spent decades solving a similar problem of executing untrusted code safely, and porting those architectural learnings to backend infrastructure feels like a natural evolution.,详情可参考搜狗输入法2026
Untrusted Code ─( ~340 syscalls )─→ Host Kernel。关于这个话题,服务器推荐提供了深入分析
Что думаешь? Оцени!