Execute WebAssembly files with the Onyx runtime by specifying file paths and execution parameters for running WASM code.
101,563 tools. Last updated 2026-04-10 10:57
- Execute JavaScript code in a secure WebAssembly sandbox to run untrusted code safely and return console logs with evaluated expressions.Apache 2.0
- Compile Edict language AST into WebAssembly modules. Convert JSON abstract syntax trees to base64-encoded WASM binaries for execution.MIT
- Run Python code securely in a WebAssembly sandbox to execute scripts and return output. Supports pure Python without external dependencies.Apache 2.0
- Execute WebAssembly modules in a secure sandbox with controlled access to filesystem, network, and crypto via host adapters. Supports execution limits and deterministic replay.MIT
- Re-execute WebAssembly modules with recorded replay tokens to reproduce runtime behavior deterministically. Replays non-deterministic host responses for debugging and verification against known execution traces.MIT
Matching MCP Servers
- AsecurityAlicense-qualityCapsule MCP server gives your AI agent the ability to safely run untrusted Python and JavaScript code in a secure WebAssembly sandbox.Last updated a day ago2138276Apache 2.0
- AsecurityAlicense-qualityProvides code context and analysis for AI assistants by extracting directory structures and code symbols using WebAssembly Tree-sitter parsers with zero native dependencies.Last updated 7 months ago16622MIT