websandbox
A sandbox library for runnung javascript inside HTML5 sandboxed iframe
Found 21 results for untrusted
A sandbox library for runnung javascript inside HTML5 sandboxed iframe
A sandbox library for runnung javascript inside HTML5 sandboxed iframe
Sandbox node.js code
A secure sandbox to execute untrusted user JavaScript, in a web browser, without any risk to your own domain/site/page.
execute untrusted code with custom permissions
Tries to isolate execution of untrusted code
Run un-trusted javascript code in a multi-tenant, isolated environment
Jailed-Node — flexible JS sandbox (jailed fork)
Run untrusted code as a VM in a child process
Python like language to execute untrusted codes in browsers and Node.js.
Python like language to execute untrusted codes in browsers and Node.js.
Execute JavaScript in an isolated, browser environment (box). You can spawn new boxes from your script, creating - tree of boxes.
Virtual proxied callbacks through json.
Forked module 'jailed' with some adjustments to be able to import some allowed modules from within sandboxed code.
Run untrusted javascript code in a pool of worker processes.
Javascript sandbox module for node
Sandbox for executing (somewhat) untrusted code
Virtual proxied callbacks through json.
A sandbox for safely running untrusted code in playgrounds
Run a QuickJS worker from NodeJS
Safely execute untrusted code with ESM syntax support, dynamic injection of ESM modules from URL or plain JS code, and granular access control based on whitelisting for each JS object.