Access control in the real worldWe still should consider about security architecture and bugs even if there are secure isolation.Security Architecture NotionDot-Dot AttackTrust ArchitectureCode IntegrityCode Injection attackSoftware Sandboxing