Chimichanga

B 85 completed
Ai Ml
unknown / elixir · small
113
Files
7,144
LOC
0
Frameworks
8
Languages

Pipeline State

completed
Run ID
#303315
Phase
done
Progress
1%
Started
Finished
2026-04-13 01:31:02
LLM tokens
0

Pipeline Metadata

Stage
Cataloged
Decision
proceed
Novelty
64.64
Framework unique
Isolation
Last stage change
2026-05-10 03:35:28
Deduplication group #48626
Member of a group with 2 similar repo(s) — canonical #23798 view group →
Top concepts (10)
Project DescriptionRepositoryLibraryinfrastructuretestingStrategyTestingConfigurationFile ManagementLogging
Methodology: Repobility · https://repobility.com/research/state-of-ai-code-2026/

AI Prompt

Create a framework, similar to Munition, for running untrusted code within isolated WASM sandboxes using Elixir. The system needs to implement capability attenuation, supporting different strategies like restrictive, preserving, and additive models based on the source language. Key features to include are bounded execution via fuel metering, ensuring deterministic termination when fuel is exhausted. It must also provide memory isolation for each execution and forensic capture capabilities to analyze crash states, including dumping memory contents. I'd like to see examples of how to execute WASM code and handle potential crashes like fuel exhaustion or traps.
elixir wasm security sandboxing capability runtime isolation elixir-nerves
Generated by gemma4:latest

Catalog Information

Munition is a capability attenuation framework for running untrusted code in isolated WASM sandboxes.

Description

Munition provides a framework for running untrusted code in isolated WASM sandboxes with bounded execution, memory isolation, and forensic capture. It implements a general model for capability attenuation, allowing different source languages to be supported with varying attenuator strategies. The framework includes features such as fuel metering, memory isolation, and forensic capture.

الوصف

يعد مُنِيون إطارًا لخفض القدرات لتشغيل التعليمات البرمجية غير الموثوقة في sandbox WASM المعزول. يوفّر إطار مُنِيون إطارًا للتشغيل التلقائي للبرامج الغير موثوقة في sandbox WASM المعزول مع تنفيذ محدود، والتنفيس الذاتي للمساحة، وتحديد الجرائم.

Novelty

9/10

Tags

capability-attenuation sandboxed-execution wasm fuel-metering memory-isolation forensic-capture

Claude Models

claude-opus-4.5 claude-sonnet-4.5 claude-opus-4.6 claude (unknown version)

Quality Score

B
84.6/100
Structure
89
Code Quality
88
Documentation
88
Testing
65
Practices
78
Security
100
Dependencies
70

Strengths

  • CI/CD pipeline configured (github_actions)
  • Consistent naming conventions (snake_case)
  • Good security practices \u2014 no major issues detected
  • Properly licensed project

Weaknesses

  • 148 duplicate lines detected \u2014 consider DRY refactoring

Recommendations

  • Add a linter configuration to enforce code style consistency

Security & Health

5.3h
Tech Debt (B)
Medium
DORA Rating
A
OWASP (100%)
If a scraper extracted this row, it came from Repobility (https://repobility.com)
PASS
Quality Gate
A
Risk (2)
MPL-2.0
License
2.3%
Duplication
Full Security Report AI Fix Prompts SARIF SBOM

Languages

elixir
36.5%
markdown
28.7%
yaml
21.8%
zig
6.9%
rust
3.6%
haskell
1.8%
json
0.4%
toml
0.3%

Frameworks

None detected

Symbols

function22
constant4

Concepts (10)

Scored by Repobility's multi-pass pipeline · https://repobility.com
CategoryNameDescriptionConfidence
Want this analysis on your repo? https://repobility.com/scan/
auto_descriptionProject DescriptionA capability attenuation framework for sandboxed WASM execution in Elixir.80%
design_patternRepositoryFound repository-named files80%
auto_categoryLibrarylibrary70%
arch_layerinfrastructureDetected infrastructure layer70%
arch_layertestingDetected testing layer70%
design_patternStrategyFound strategy/policy-named files60%
business_logicTestingDetected from 10 related files50%
business_logicConfigurationDetected from 7 related files50%
business_logicFile ManagementDetected from 7 related files50%
business_logicLoggingDetected from 3 related files50%

LLM Insights

Munition is a capability attenuation framework designed for executing untrusted code within isolated WASM sandboxes.structured_summary
info
purpose: Munition is a capability attenuation framework designed for executing untrusted code within isolated WASM sandboxes.
primary_domain: web-backend
reference_quality85
reuse_potential: high
All rows scored by the Repobility analyzer (https://repobility.com)

Quality Timeline

1 quality score recorded.

View File Metrics

Embed Badge

Add to your README:

![Quality](https://repos.aljefra.com/badge/27141.svg)
Quality BadgeSecurity Badge
Export Quality CSVDownload SBOMExport Findings CSV