Safe Rust (sandboxing untrusted modules at API level)

Is it easy to compile the Rust code inside the sandbox?

trivial for safe code to force your process to abort by hitting the end of the stack

Cleanly (without undefined behaviour) exiting is not a concern.

"software sandbox" looks promising, except of the

Please do not use Rust as a language-based sandbox.

phrase and the blacklisting (instead of whitelisting) approach.

TODO: looping, unwinding, stack overflow, memory leaks, abort, oom

are not a concern unless they can send your wallet.dat to the attacker.