Despite the name, WASM files are binary data. If you want to see the disassembly, either look at the WASM files in browser devtools under the "Sources" tab, or use the wasm2wat tool from the WABT toolkit: https://github.com/WebAssembly/wabt
On Thursday, 4 November 2021 at 18:22:11 UTC+1 [email protected] wrote: > I download from the browser an a file .wasm of an web application where > inside > is present a unique string like: > > > YAJ/fwF/YAF/AX5gBX9/f39/AGAAAGADf39/AGAHf39/f39/fwBgBH9/f38Bf2AAAX9gAX8Bf2AEf39/fwBgBn9/f39/fwF/YAd/f39/f39/AX9gAAACVQIHLi9pbmRleCJfX3diZ19sb2FkUmVzdWx0c19hNzlhNDg1ODc0MmIxNDkyAAUHLi9pbmRleBxfX3diZ19lcnJvcl... > > that is very strange. I usually see some code in file wasm. > Is it possible for the code to be decrypted and executed on the fly in the > browser? > -- You received this message because you are subscribed to the Google Groups "emscripten-discuss" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/emscripten-discuss/acaf9af8-0c26-4f91-ac11-977ac22fdd9bn%40googlegroups.com.
