Access commands and programs in the host operating system

• 2 minutes to read

WASI enables WebAssembly programs to call standard library functions in the host operating system. It does so through a fine-grained security model known as “capability-based security”. The WebAssembly VM owner can grant access to host system resources when the VM starts up. The program cannot access any resources (e.g., file folders) that are not explicitly allowed.

Now, why limit ourselves to standard library functions? The same approach can be used to call just any host functions from WebAssembly. The Second State WebAssembly VM provides a WASI-like extension to access any command line programs in the host operating system.

The command line program can

  • Take input via command line arguments, as well as the STDIN stream.
  • Return value and data via the STDOUT stream.

Application developers for the Second State VM (SSVM) can use our Rust interface crate to access this functionality. In Cargo.toml, make sure that you have this dependency.

rust_process_interface_library = "0.1.3"

In the Rust application, you can now use the API methods to start a new process for the operating system command program, pass in arguments via the arg() method as well as via the STDIN, and receives the return values via the STDOUT.

let mut cmd = Command::new("http_proxy");


let out = cmd.output();

The Rust function is then compiled into WebAssembly and can run in the SSVM.

To see the SSVM command and process interface in action, please check out the following tutorials.

Note: The two Tensorflow examples serve as demonstrations on how the command and process interface works. For Tensorflow applications, SSVM has a special WASI-like extension for calling Tensorflow library functions on the host system. Check it out.

RustJavaScriptWebAssemblyNode.jscloud computingWASIcommandprocess
Fast, safe, portable and serverless Rust functions as services