Javascript sandbox in docker, use the eval function to execute untrusted code.
- It is a simple API that is listening on all the routes
- You can make a POST, PATCH or PULL request with your untrusted JS in the body
- You can make a GET or DELETE request with your untrusted JS in the query parameter "data"
The API will then eval the code and sending the result into the body of the response.