hemlockiv Many security analysts, including a few I had linked, seem to disagree.
Again, there are multiple classes of concern.
Concerns about whether the internal state of an app compiled to WebAssembly might be corruptible are not at all the same as concerns about a WebAssembly program escaping into the browser or even into the OS.
The snyk.io piece lists a wide variety of concerns, but several of them are about the internal state of WebAssembly apps. It also mentions XSS. XSS attacks began with, and still mostly affect, regular web pages that have nothing at all to do with WebAssembly. Disabling WebAssembly does not protect against XSS mistakes in non-WebAssembly web apps. And in fact disabling WebAssembly may well result in a site falling back to a regular web app; if the WebAssembly app has an XSS vulnerability, probably the regular web app will too.
It is possible to pile up a list of bad things that might happen while WebAssembly is running. But that list of bad things is happening only because the Internet is involved! Turning off WebAssembly may well not provide protection against that list of bad things, but turning off the Internet probably will.
hemlockiv When I have searched for information of the security/exploitability of WASM, the results don't look encouraging.
I don't think counting up the number of articles that express some concern about WebAssembly, without figuring out which of those concerns are/aren't relevant to a specific threat model, is likely to be a productive approach.
Vanadium disables JIT by default due to a fair density of site-escape and browser-escape vulnerabilities in JITs. Vanadium does not have a toggle for disabling interpreted WebAssembly, because of an absence of evidence that interpreted WebAssembly is a larger threat than regular interpreted JavaScript. If it is possible to provide evidence that interpreted WebAssembly is a larger threat than regular interpreted JavaScript, that would be relevant to a request for a toggle to disable interpreted WebAssembly.