The persistent question of whether WebAssembly (Wasm) could supplant established orchestration platforms like Kubernetes has been a recurring theme in cloud-native discussions. This inquiry, while seemingly provocative, highlights a fundamental misunderstanding of WebAssembly’s role as an extender rather than a replacement for existing infrastructure. Recent advancements, particularly the integration of WebAssembly modules directly within Helm, a popular Kubernetes package manager, underscore this dynamic, promising enhanced security and efficiency without challenging Kubernetes’ foundational position.
The genesis of this comparison can be traced back over four years, when early explorations into WebAssembly’s potential led to direct comparisons with Kubernetes. These initial assessments, while met with some skepticism, laid the groundwork for a deeper understanding of how these technologies could coexist and complement each other. One notable instance involved a tweet from Kelsey Hightower, a prominent figure in the cloud-native space, who initially dismissed the notion of WebAssembly replacing Kubernetes as "ridiculous." However, upon further engagement, Hightower acknowledged the exploratory nature of the comparison, clarifying that the intent was to understand potential synergies rather than advocate for a direct substitution. This initial back-and-forth, though resolved amicably, reflected a broader community grappling with the novel capabilities of WebAssembly.
A pivotal moment in solidifying this understanding for many, including the author, came through hands-on experience. A workshop hosted by Cosmonic, focused on WebAssembly cloud and deployment with WasmCloud, provided a tangible demonstration of WebAssembly’s power. Bailey Hayes, CTO of Cosmonic, guided participants through the process of deploying microservices using WebAssembly. The experience was eye-opening, as Hayes explained, "Wow, I can deploy things without having to change the underlying infrastructure, essentially anywhere I want, with just a CPU instruction set through a single endpoint." The ability to achieve simultaneous deployment of microservices with a single command line, experiencing the application "everywhere," evoked a parallel to Kubernetes’ core promise of abstracting infrastructure. This initial impression fueled the thought, "Well, maybe that could be something. Isn’t that what Kubernetes is supposed to do? Plus, it’s simple.”
This initial impression, however, evolved with deeper technical understanding. It became clear that WebAssembly and Kubernetes operate on fundamentally different principles and serve distinct, albeit increasingly interconnected, purposes. While WebAssembly excels at providing a secure, portable, and efficient runtime for code execution across diverse environments, Kubernetes remains the de facto standard for orchestrating containerized applications at scale, managing complex deployments, scaling, and ensuring high availability.
The integration of WebAssembly modules directly into Helm marked a significant development in this evolving landscape. The thought process at the time was one of renewed curiosity: "Oh, here we go again. We can run WebAssembly modules with Helm; maybe we won’t need Kubernetes.” This sentiment, however, was quickly re-evaluated. The realization dawned that this integration was not about replacing Kubernetes but about enhancing its capabilities.

The advent of Helm 4, with its direct support for WebAssembly modules through the Extism WebAssembly plugin, addressed a critical gap in Helm 3’s capabilities: isolation. Helm 3, while effective for package management, lacked the robust sandboxing necessary for running arbitrary code securely. Helm 4, by leveraging Extism, introduces a secure execution environment for WebAssembly modules. This allows for the implementation of sophisticated policy considerations, multi-language features, and other advanced functionalities within these modules, which can then be deployed and managed within a Kubernetes cluster.
The True Role of WebAssembly: An Extender, Not a Replacement
The narrative that WebAssembly will replace Kubernetes is a misinterpretation of its core value proposition. Instead, WebAssembly is predominantly an extender of existing systems. In the context of Helm, this means using WebAssembly modules to enhance the deployment, management, and distribution of workloads. These modules can target a theoretically infinite number of endpoints capable of executing CPU instructions, all managed within the Kubernetes ecosystem.
This symbiotic relationship was the central theme of a presentation titled "Helm Meets WebAssembly: Secure Extensibility Without Replacing Kubernetes" delivered at the Wasm I/O conference in Barcelona. The talk, co-presented by the author and Shivay Lamba, highlighted the technical intricacies and security benefits of this integration. Lamba, unable to attend in person due to geopolitical travel disruptions, delivered his segment remotely via video.
Securing the Supply Chain with Helm and Extism
Lamba detailed how the Extism plugin provides a lightweight framework for building WebAssembly-based systems. A key innovation is Helm 4’s use of a built-in tool, powered by Extism, to create an invisible, isolated sandbox within its own system. This sandbox acts as a secure environment where WebAssembly plugin code is executed. Critically, within this sandbox, the plugin is completely isolated and disconnected from the host system.

"Helm takes the command you have typed, packages the data up safely, and slides it into the sandbox to be executed so the plugin can start working," Lamba explained. "Since the plugin is isolated, it cannot directly touch your computer’s hard drive or the internet." This principle extends to external resource access. If a plugin requires external resources, such as downloading a file, it must formally request this action from a "host function" operating outside the sandbox. This host function acts as a gatekeeper, enforcing predefined security rules. For instance, if security policies permit a plugin to download from github.com, the host guard will facilitate this action. Conversely, any attempt by the plugin to access resources beyond its authorized scope will be immediately blocked by the guard.
Upon completion of its task, the plugin packages its results and returns them to Helm. Helm then proceeds to dismantle the sandbox, effectively destroying the WebAssembly module and purging any temporary files used by the plugin. "In this way, with the help of Extism, Helm ensures that plugins only get what they need to do their jobs and absolutely nothing more," Lamba emphasized. This meticulous process significantly enhances the security posture of the Helm deployment process.
Demonstrating Security: Helm 3 vs. Helm 4
A practical demonstration at the conference starkly illustrated the security advancements introduced by Helm 4. In a test with Helm 3, the WebAssembly plugin (Extism) was not adequately sandboxed. A simple script, executed with the plugin’s full permissions, was able to list the user’s home directory and other sensitive system information. This outcome represented an "unbounded security risk," as it demonstrated a clear vulnerability where unauthorized access was possible.
[SCREENSHOT 1 INSERTION POINT: A screenshot showing the output of a script listing sensitive directory information, attributed to Helm 3’s lack of sandboxing.]
The contrast was evident when attempting a similar operation with Helm 4. The system generated an "executable not found" error, signifying that Helm 4 refused to execute the plugin without its secure sandbox runner. This deliberate failure underscored the importance of the Extism-provided protection; Helm 4 prioritizes security over insecure execution.

[SCREENSHOT 2 INSERTION POINT: A screenshot displaying the "executable not found" error message from Helm 4, highlighting its refusal to run insecurely.]
Once the secure path was re-established and the sandbox configured correctly, the "guard" function became active, effectively protecting the system. The demonstration concluded by showcasing the restored security, where the plugin operated within its authorized boundaries.
[SCREENSHOT 3 INSERTION POINT: A screenshot showing the successful and secure execution of a plugin within Helm 4, with the "guard" actively protecting the system.]
Implications for Cloud-Native Security and Efficiency
The integration of Extism’s WebAssembly plugin within Helm represents a significant step forward in bolstering both supply chain and runtime security. Through mandatory signing and verification processes, and by providing clearer provenance for executed code, this integration enhances trust and transparency in the deployment pipeline. Simultaneously, it maintains Helm’s user-friendly, "batteries included" philosophy for default operations.
While WebAssembly via Helm will not replace Kubernetes, its contribution to the platform is substantial. It empowers Kubernetes users to achieve a more secure and computationally efficient operational environment. This synergy allows organizations to leverage the strengths of both technologies: Kubernetes for robust orchestration and infrastructure management, and WebAssembly through Helm for secure, extensible, and portable execution of specialized tasks and policies. This evolution points towards a future where cloud-native environments are not only more powerful but also inherently more secure and adaptable. The continuous development in this space suggests that the exploration of WebAssembly’s potential as an enhancer, rather than a disruptor, of existing cloud-native architectures will continue to yield significant innovations.
