а ну вот что нагрепал:
As an additional probabilistic defense in native execution,
address space layout randomization (ASLR) [51] randomly
arranges the stack, heap, and code in the address space at
runtime. For a successful attack, the attacker thus first has
to obtain a pointer, e.g., to the heap, via an information disclosure vulnerability. In WebAssembly, there is no ASLR.
WebAssembly linear memory is arranged deterministically,
i.e., stack and heap positions are predictable from the compiler and program. Even if one were to add some form of
ASLR to WebAssembly, linear memory is addressed by 32-
bit pointers, which likely does not provide enough entropy
for strong protection [58].