Videos
Or for that matter how does any of these non javascript code playgrounds work?
I have a vague idea that you can use secccomp to craft what syscalls can a process have access to. So, containers with resource constraints + seccomp is the way to solve the problem of running an untrusted code?
I found this amazing blog post by Andrew Gerrand, explaining the internals of Go playground. But the disclaimer makes me sad
NOTE: This article does not describe the current version of the Go Playground.
Since Playgroud V3, the implementation changed from using Nacl to gVisor. TBH I couldn't grok it well.
Are there any recorded talks on Go Playground or for any such code Playground projects in general?
If you have any detailed resources on this topic please help me. This tech is super interesting 🙂