frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

OpenWorkers: Self-Hosted Cloudflare Workers in Rust

https://openworkers.com/introducing-openworkers
107•max_lt•2h ago

Comments

max_lt•2h ago
I've been working on this for some time now, starting with vm2, then deno-core for 2 years, and recently rewrote it on rusty_v8 with Claude's help.

  OpenWorkers lets you run untrusted JS in V8 isolates on your own infrastructure. Same DX as Cloudflare Workers, no vendor lock-in.

  What works today: fetch, KV, Postgres bindings, S3/R2, cron scheduling, crypto.subtle.

  Self-hosting is a single docker-compose file + Postgres.

  Would love feedback on the architecture and what feature you'd want next.
indigodaddy•1h ago
Perhaps it might be helpful to some to also lay out the things that don't work today (or eg roadmap of what's being worked on that doesn't currently work?). Anyway, looks very cool!
max_lt•57m ago
Good idea! Main things not yet implemented: Durable Objects, WebSockets, HTMLRewriter, and cache API. Next priority is execution recording/replay for debugging. I'll add a roadmap section to the docs.
simonw•56m ago
The problem with sandboxing solutions is that they have to provide very solid guarantees that code can't escape the sandbox, which is really difficult to do.

Any time I'm evaluating a sandbox that's what I want to see: evidence that it's been robustly tested against all manner of potential attacks, accompanied by detailed documentation to help me understand how it protects against them.

This level of documentation is rare! I'm not sure I can point to an example that feels good to me.

So the next thing I look for is evidence that the solution is being used in production by a company large enough to have a dedicated security team maintaining it, and with real money on the line for if the system breaks.

vlovich123•54m ago
Since it’s self hosted the sandboxing aspect at the language/runtime level probably matters just a little bit less.
samwillis•53m ago
Yes, exactly. The other reason Cloudflare workers runtime is secure is that they are incredibly active at keeping it patched and up to date with V8 main. It's often ahead of Chrome in adopting V8 releases.
ForHackernews•51m ago
Not if you're self-hosting and running your own trusted code, you don't. I care about resource isolation, not security isolation, between my own services.
twosdai•39m ago
Completely agree. There are some apps that unfortunately need to care about some level of security isolation, but with an open workers they could just put those specific workers on their own isolated instance.
max_lt•40m ago
Fair point. The V8 isolate provides memory isolation, and we enforce CPU limits (100ms) and memory caps (128MB). Workers run in separate isolates, not separate processes, so it's similar to Cloudflare's model. That said, for truly untrusted third-party code, I'd recommend running the whole thing in a container/VM as an extra layer. The sandboxing is more about resource isolation than security-grade multi-tenancy.
gpm•31m ago
I think you should consider adjusting the marketing to reflect this. "untrusted JavaScript" -> "JavaScript", "Secure sandboxing with CPU (100ms) and memory (128MB) limits per worker" -> "Sandboxing with CPU (100ms) and memory (128MB) limits per worker", overhauling https://openworkers.com/docs/architecture/security.

Over promising on security hurts the credibility of the entire project - and the main use case for this project is probably executing trusted code in a self hosted environment not "execut[ing] untrusted code in a multi-tenant environment".

imcritic•36m ago
I don't think what you want us even possible. How would such guarantees even look like? "Hello, we are a serious cybersec firm and we have evaluated the code and it's pretty sound, trust us!"?

"Hello, we are a serious cybersec firm and we have evaluated the code and here are our test with results that proof that we didn't find anything, the code is sound; Have we been through? We have, trust us!"

gpm•15m ago
In terms of a one off product without active support - the only thing I can really imagine is a significant use of formal methods to prove correctness of the entire runtime. Which is of course entirely impractical given the state of the technology today.

Realistically security these days is an ongoing process, not a one off, compare to cloudflare's security page: https://developers.cloudflare.com/workers/reference/security... (to be clear when I use the pronoun "we" I'm paraphrasing and not personally employed by cloudflare/part of this at all)

- Implicit/from other pieces of marketing: We're a reputably company with these other big reputable companies who care about security and are juicy targets for attacks using this product.

- We update V8 within 24 hours of a security update, compared to weeks for the big juicy target of Google Chrome.

- We use various additional sandboxing techniques on top of V8, including the complete lack of high precision timers, and various OS level sandboxing techniques.

- We detect code doing strange things and move it out of the multi-tennant environment into an isolated one just in case.

- We detect code using APIs that increase the surface area (like debuggers) and move it out of the multi-tennant environment into an isolated on just in case.

- We will keep investing in security going forwards.

Running secure multi-tenant environments is not an easy problem. It seems unlikely that it's possible for a typical open source project (typical in terms of limited staffing, usually including a complete lack of on-call staff) to release software to do so today.

vmg12•1h ago
Does this actually use the cloudflare worker runtime or is this just a way to run code in v8 isolates?
max_lt•57m ago
It's a custom V8 runtime built with rusty_v8, not the actual Cloudflare runtime (github.com/openworkers/openworkers-runtime-v8). The goal is API compatibility – same Worker syntax (fetch handler, Request/Response, etc.) so you can migrate code easily. Under the hood it's completely independent.
kachapopopow•54m ago
I see anything that reduces the relience on vendor lock-in I upvote. Hopefully cloud services see mass exodus so they have to have reasonable pricing that actually reflects their costs instead of charging more than free for basic services like NAT.

Cloud services are actually really nice and convenient if you were to ignore the eye watering cost versus DIY.

geek_at•39m ago
I'm worrying that the increasing ram prices will drive more people away from local and more to cloud services because if the big companies are buying up all the resources it might not be feasible to self host in a few years
kristianpaul•51m ago
Interesting option to consider next to openfaas
st3fan•27m ago
This is very nice! Do you plan to hook this up to GitHub, so that a push of worker code (and maybe a yaml describing the environment & resources) will result in a redeploy?
max_lt•13m ago
Not yet, but it's one of the next big features. I'm currently working on the CLI (WIP), and GitHub integration with auto-deploy on push will come after that. A yaml config for bindings/cron is definitely on the roadmap too.
max_lt•11m ago
I'm also working on execution recording/replay – the idea is to capture a deterministic trace of a request, so you can push it as a GitHub issue and replay it locally (or let an AI debug it).
strangescript•19m ago
Cool project, but I never found the cloudflare DX desirable compared to self hosted alternatives. A plain old node server in a docker container was much easier to manage, use and is scalable. Cloudflare's system was just a hoop that you needed to jump through to get to the other nice to haves in their cloud.
skybrian•10m ago
Would it be useful for testing apps that you're going to deploy on Cloudflare anyway?
mohsen1•17m ago
This is super nice! Thank you for working on this!

Recently really enjoying CloudFlare Workflows (used it in https://mafia-arena.com) and would be nice to build Workflows on top of this too.

Technology Is Culture

https://lemire.me/blog/2026/01/01/technology-is-culture/
1•zdw•1m ago•0 comments

Show HN: Handsom.ai – Vibe coding sites you don't have to rebuild

https://handsom.ai/blog/making-vibe-coding-reliable
1•justinThompson•1m ago•0 comments

AI Shifts Expectations for Entry Level Jobs

https://spectrum.ieee.org/ai-effect-entry-level-jobs
1•gmays•3m ago•0 comments

Brain – The Hallucinating Chemist: From Synapse to Self

https://govindchavada.substack.com/p/brain-the-hallucinating-chemist-from
1•Finbarr•4m ago•0 comments

Crypto users forced to share account details with tax officials

https://www.bbc.co.uk/news/articles/ckgl2je65klo
1•iamben•7m ago•0 comments

I made auto-aim for mini golf [video]

https://www.youtube.com/watch?v=JQB8aNKyeao
1•thewavelength•10m ago•0 comments

I Thought 2025 Was Cloudy. 26 Years of Data Proved Me Wrong

https://olekwrites.com/cloudy-year-perception-vs-reality/
2•olek•12m ago•0 comments

FAFO: How we stopped worrying and bought an Electron Microscope [video]

https://www.youtube.com/watch?v=zfPYij2-ry0
3•hmelder•12m ago•0 comments

Show HN: Toy Browser Update (January 2026) [video]

https://www.youtube.com/watch?v=4xdIMmrLMLo
1•logicallee•13m ago•0 comments

New maps reveal post-flood migration patterns across the US

https://kinder.rice.edu/urbanedge/fema-buyouts-vs-risky-real-estate-new-maps-reveal-post-flood-mi...
1•toomuchtodo•13m ago•1 comments

Swapping two blocks of memory inside a larger block, in constant memory

https://devblogs.microsoft.com/oldnewthing/20260101-00/?p=111955
1•ingve•14m ago•0 comments

China drafts strictest rules to end AI-encouraged suicide, violence

https://arstechnica.com/tech-policy/2025/12/china-drafts-worlds-strictest-rules-to-end-ai-encoura...
1•thunderbong•15m ago•0 comments

Show HN: Memoria – Spam exists, but can't climb (A local-first protocol)

https://github.com/Kusaneko-Memoria/memoria-protocol
1•Kusaneko•17m ago•1 comments

The peace of a nation no longer besieged by the third world

https://twitter.com/DHSgov/status/2006472108222853298
5•SilverElfin•17m ago•2 comments

NJ buying flood prone properties

https://dep.nj.gov/blueacres/
1•bnolan001•17m ago•2 comments

Public Domain Day 2026 in Literature

https://standardebooks.org/blog/public-domain-day-2026
3•robin_reala•19m ago•1 comments

WireGuard packet relay for NAT traversal

https://github.com/weiiwang01/wpex
1•progval•21m ago•0 comments

Show HN: Guess the Move Chess App

https://guessthemove.app
1•travelhead•21m ago•0 comments

Amy Schumer Moves On, Selling 'Moonstruck' House in Brooklyn

https://www.nytimes.com/2025/12/31/realestate/amy-schumer-moves-on-selling-moonstruck-house-in-br...
1•whack•25m ago•0 comments

TimesWire

https://donohoe.dev/timeswire/
1•donohoe•25m ago•0 comments

A Sparse Transformer with Tunable Emergent Subnetworks

https://github.com/wwes4/ResonanceTransformer
1•wwes369•27m ago•0 comments

Which Power Plant Does My Electricity Come From? [video]

https://www.youtube.com/watch?v=sH1PVVJuBtE
1•keepamovin•28m ago•0 comments

Every LLM hallucinates that std:vector deletes elements in LIFO order

https://am17an.bearblog.dev/every-llm-hallucinates-stdvector-deletes-elements-in-a-lifo-order/
3•am17an•29m ago•1 comments

The Miracle of Microfinance? Evidence from a Randomized Evaluation

https://www.aeaweb.org/articles?id=10.1257/app.20130533
1•haltingproblem•31m ago•0 comments

Ask HN: How Are You Handling Auth in 2026?

3•joshcsimmons•31m ago•1 comments

Amoskeag: F/OSS DSL for business rules - functional language inspired by Ruby

https://github.com/durable-oss/amoskeag
2•djb-at-durable•31m ago•0 comments

AI is not neutral. It judges you [video]

https://www.youtube.com/watch?v=LqiActVUm4Q
1•shine1697•34m ago•0 comments

Show HN: Downmark – Turn webpages into distraction-free Markdown

https://downmark.fly.dev/https%3A%2F%2Fgithub.com%2Fadhipk%2Fdownmark
1•AdhipKashyap•36m ago•0 comments

Back to basics: The foundations that shape everything we design

https://designexplained.substack.com/p/back-to-basics-the-foundations-that
1•kaizenb•37m ago•0 comments

MHC: Manifold-Constrained Hyper-Connections

https://arxiv.org/abs/2512.24880
2•tamnd•40m ago•0 comments