PoC for process virtual machine to interpret WASM binaries within the context of the TB verification game and it's particular constraints
argparser.py
is the interpreter. I'll change the name later.
getobj.sh
dumps a hex file that's easy to read. you need binaryen for this to work.
injected.wast
is the test file generated by wasmfiddle.
The c-samples
directory contains simple C files and their WAST translation for anyone who wants to get a feel for it.
Just what the name says:
To be able to run the code as it is right now, you need to get the binary. I'm using binaryen.
Our implementation will not run on python2.x.
To run the interpreter you should call:
python3 argparser.py --wasm ./injected.wasm