diff --git a/core/executor/src/host_interface.rs b/core/executor/src/host_interface.rs
index 7d87d93333fd25c734ec0861112670c10dd27ebe..4d1515d76999b7fafcf4b899ebe90698999b89dd 100644
--- a/core/executor/src/host_interface.rs
+++ b/core/executor/src/host_interface.rs
@@ -18,10 +18,8 @@
 //!
 //! These are the host functions callable from within the Substrate runtime.
 
-use crate::error::{Error, Result};
-
 use codec::Encode;
-use std::{convert::TryFrom, str, panic};
+use std::{convert::TryFrom, str};
 use primitives::{
 	blake2_128, blake2_256, twox_64, twox_128, twox_256, ed25519, sr25519, Blake2Hasher, Pair,
 	crypto::KeyTypeId, offchain,
@@ -211,10 +209,7 @@ impl_wasm_host_interface! {
 				.map_err(|_| "Invalid attempt to determine key in ext_set_storage")?;
 			let value = context.read_memory(value_data, value_len)
 				.map_err(|_| "Invalid attempt to determine value in ext_set_storage")?;
-			with_external_storage(move ||
-				Ok(runtime_io::set_storage(&key, &value))
-			)?;
-			Ok(())
+			Ok(runtime_io::set_storage(&key, &value))
 		}
 
 		ext_set_child_storage(
@@ -232,10 +227,7 @@ impl_wasm_host_interface! {
 			let value = context.read_memory(value_data, value_len)
 				.map_err(|_| "Invalid attempt to determine value in ext_set_child_storage")?;
 
-			with_external_storage(move ||
-				Ok(runtime_io::set_child_storage(&storage_key, &key, &value))
-			)?;
-			Ok(())
+			Ok(runtime_io::set_child_storage(&storage_key, &key, &value))
 		}
 
 		ext_clear_child_storage(
@@ -249,27 +241,19 @@ impl_wasm_host_interface! {
 			let key = context.read_memory(key_data, key_len)
 				.map_err(|_| "Invalid attempt to determine key in ext_clear_child_storage")?;
 
-			with_external_storage(move ||
-				Ok(runtime_io::clear_child_storage(&storage_key, &key))
-			)?;
-			Ok(())
+			Ok(runtime_io::clear_child_storage(&storage_key, &key))
 		}
 
 		ext_clear_storage(key_data: Pointer<u8>, key_len: WordSize) {
 			let key = context.read_memory(key_data, key_len)
 				.map_err(|_| "Invalid attempt to determine key in ext_clear_storage")?;
-			with_external_storage(move ||
-				Ok(runtime_io::clear_storage(&key))
-			)?;
-			Ok(())
+			Ok(runtime_io::clear_storage(&key))
 		}
 
 		ext_exists_storage(key_data: Pointer<u8>, key_len: WordSize) -> u32 {
 			let key = context.read_memory(key_data, key_len)
 				.map_err(|_| "Invalid attempt to determine key in ext_exists_storage")?;
-			with_external_storage(move ||
-				Ok(if runtime_io::exists_storage(&key) { 1 } else { 0 })
-			)
+			Ok(if runtime_io::exists_storage(&key) { 1 } else { 0 })
 		}
 
 		ext_exists_child_storage(
@@ -283,18 +267,13 @@ impl_wasm_host_interface! {
 			let key = context.read_memory(key_data, key_len)
 				.map_err(|_| "Invalid attempt to determine key in ext_exists_child_storage")?;
 
-			with_external_storage(move ||
-				Ok(if runtime_io::exists_child_storage(&storage_key, &key) { 1 } else { 0 })
-			)
+			Ok(if runtime_io::exists_child_storage(&storage_key, &key) { 1 } else { 0 })
 		}
 
 		ext_clear_prefix(prefix_data: Pointer<u8>, prefix_len: WordSize) {
 			let prefix = context.read_memory(prefix_data, prefix_len)
 				.map_err(|_| "Invalid attempt to determine prefix in ext_clear_prefix")?;
-			with_external_storage(move ||
-				Ok(runtime_io::clear_prefix(&prefix))
-			)?;
-			Ok(())
+			Ok(runtime_io::clear_prefix(&prefix))
 		}
 
 		ext_clear_child_prefix(
@@ -307,21 +286,13 @@ impl_wasm_host_interface! {
 				.map_err(|_| "Invalid attempt to determine storage_key in ext_clear_child_prefix")?;
 			let prefix = context.read_memory(prefix_data, prefix_len)
 				.map_err(|_| "Invalid attempt to determine prefix in ext_clear_child_prefix")?;
-			with_external_storage(move ||
-				Ok(runtime_io::clear_child_prefix(&storage_key, &prefix))
-			)?;
-
-			Ok(())
+			Ok(runtime_io::clear_child_prefix(&storage_key, &prefix))
 		}
 
 		ext_kill_child_storage(storage_key_data: Pointer<u8>, storage_key_len: WordSize) {
 			let storage_key = context.read_memory(storage_key_data, storage_key_len)
 				.map_err(|_| "Invalid attempt to determine storage_key in ext_kill_child_storage")?;
-			with_external_storage(move ||
-				Ok(runtime_io::kill_child_storage(&storage_key))
-			)?;
-
-			Ok(())
+			Ok(runtime_io::kill_child_storage(&storage_key))
 		}
 
 		ext_get_allocated_storage(
@@ -331,11 +302,8 @@ impl_wasm_host_interface! {
 		) -> Pointer<u8> {
 			let key = context.read_memory(key_data, key_len)
 				.map_err(|_| "Invalid attempt to determine key in ext_get_allocated_storage")?;
-			let maybe_value = with_external_storage(move ||
-				Ok(runtime_io::storage(&key))
-			)?;
 
-			if let Some(value) = maybe_value {
+			if let Some(value) = runtime_io::storage(&key) {
 				let offset = context.allocate_memory(value.len() as u32)?;
 				context.write_memory(offset, &value)
 					.map_err(|_| "Invalid attempt to set memory in ext_get_allocated_storage")?;
@@ -361,11 +329,7 @@ impl_wasm_host_interface! {
 			let key = context.read_memory(key_data, key_len)
 				.map_err(|_| "Invalid attempt to determine key in ext_get_allocated_child_storage")?;
 
-			let maybe_value = with_external_storage(move ||
-				Ok(runtime_io::child_storage(&storage_key, &key))
-			)?;
-
-			if let Some(value) = maybe_value {
+			if let Some(value) = runtime_io::child_storage(&storage_key, &key) {
 				let offset = context.allocate_memory(value.len() as u32)?;
 				context.write_memory(offset, &value)
 					.map_err(|_| "Invalid attempt to set memory in ext_get_allocated_child_storage")?;
@@ -388,11 +352,8 @@ impl_wasm_host_interface! {
 		) -> WordSize {
 			let key = context.read_memory(key_data, key_len)
 				.map_err(|_| "Invalid attempt to get key in ext_get_storage_into")?;
-			let maybe_value = with_external_storage(move ||
-				Ok(runtime_io::storage(&key))
-			)?;
 
-			if let Some(value) = maybe_value {
+			if let Some(value) = runtime_io::storage(&key) {
 				let data = &value[value.len().min(value_offset as usize)..];
 				let written = std::cmp::min(value_len as usize, data.len());
 				context.write_memory(value_data, &data[..written])
@@ -417,11 +378,7 @@ impl_wasm_host_interface! {
 			let key = context.read_memory(key_data, key_len)
 				.map_err(|_| "Invalid attempt to get key in ext_get_child_storage_into")?;
 
-			let maybe_value = with_external_storage(move ||
-				Ok(runtime_io::child_storage(&storage_key, &key))
-			)?;
-
-			if let Some(value) = maybe_value {
+			if let Some(value) = runtime_io::child_storage(&storage_key, &key) {
 				let data = &value[value.len().min(value_offset as usize)..];
 				let written = std::cmp::min(value_len as usize, data.len());
 				context.write_memory(value_data, &data[..written])
@@ -433,12 +390,8 @@ impl_wasm_host_interface! {
 		}
 
 		ext_storage_root(result: Pointer<u8>) {
-			let r = with_external_storage(move ||
-				Ok(runtime_io::storage_root())
-			)?;
-			context.write_memory(result, r.as_ref())
-				.map_err(|_| "Invalid attempt to set memory in ext_storage_root")?;
-			Ok(())
+			context.write_memory(result, runtime_io::storage_root().as_ref())
+				.map_err(|_| "Invalid attempt to set memory in ext_storage_root".into())
 		}
 
 		ext_child_storage_root(
@@ -448,9 +401,7 @@ impl_wasm_host_interface! {
 		) -> Pointer<u8> {
 			let storage_key = context.read_memory(storage_key_data, storage_key_len)
 				.map_err(|_| "Invalid attempt to determine storage_key in ext_child_storage_root")?;
-			let value = with_external_storage(move ||
-				Ok(runtime_io::child_storage_root(&storage_key))
-			)?;
+			let value = runtime_io::child_storage_root(&storage_key);
 
 			let offset = context.allocate_memory(value.len() as u32)?;
 			context.write_memory(offset, &value)
@@ -468,11 +419,8 @@ impl_wasm_host_interface! {
 			let mut parent_hash = [0u8; 32];
 			context.read_memory_into(parent_hash_data, &mut parent_hash[..])
 				.map_err(|_| "Invalid attempt to get parent_hash in ext_storage_changes_root")?;
-			let r = with_external_storage(move ||
-				Ok(runtime_io::storage_changes_root(parent_hash))
-			)?;
 
-			if let Some(r) = r {
+			if let Some(r) = runtime_io::storage_changes_root(parent_hash) {
 				context.write_memory(result, &r[..])
 					.map_err(|_| "Invalid attempt to set memory in ext_storage_changes_root")?;
 				Ok(1)
@@ -1146,25 +1094,6 @@ impl ReadPrimitive<u32> for &mut dyn FunctionContext {
 	}
 }
 
-/// Execute closure that access external storage.
-///
-/// All panics that happen within closure are captured and transformed into
-/// runtime error. This requires special panic handler mode to be enabled
-/// during the call (see `panic_handler::AbortGuard::never_abort`).
-/// If this mode isn't enabled, then all panics within externalities are
-/// leading to process abort.
-fn with_external_storage<T, F>(f: F) -> std::result::Result<T, String>
-	where
-		F: panic::UnwindSafe + FnOnce() -> Result<T>
-{
-	// it is safe beause basic methods of StorageExternalities are guaranteed to touch only
-	// its internal state + we should discard it on error
-	panic::catch_unwind(move || f())
-		.map_err(|_| Error::Runtime)
-		.and_then(|result| result)
-		.map_err(|err| format!("{}", err))
-}
-
 fn deadline_to_timestamp(deadline: u64) -> Option<offchain::Timestamp> {
 	if deadline == 0 {
 		None
diff --git a/core/executor/src/native_executor.rs b/core/executor/src/native_executor.rs
index 7323703ed96568af9a8e79f8aadd55a9338b794a..082f0ba2adc330eb23033539f3461f13ca7380e6 100644
--- a/core/executor/src/native_executor.rs
+++ b/core/executor/src/native_executor.rs
@@ -14,7 +14,7 @@
 // You should have received a copy of the GNU General Public License
 // along with Substrate.  If not, see <http://www.gnu.org/licenses/>.
 
-use std::{result, cell::RefCell, panic::UnwindSafe};
+use std::{result, cell::RefCell, panic::{UnwindSafe, AssertUnwindSafe}};
 use crate::error::{Error, Result};
 use crate::wasm_runtime::{RuntimesCache, WasmExecutionMethod, WasmRuntime};
 use crate::RuntimeInfo;
@@ -30,7 +30,7 @@ thread_local! {
 /// Default num of pages for the heap
 const DEFAULT_HEAP_PAGES: u64 = 1024;
 
-fn safe_call<F, U>(f: F) -> Result<U>
+pub(crate) fn safe_call<F, U>(f: F) -> Result<U>
 	where F: UnwindSafe + FnOnce() -> U
 {
 	// Substrate uses custom panic hook that terminates process on panic. Disable termination for the native call.
@@ -65,7 +65,7 @@ pub trait NativeExecutionDispatch: Send + Sync {
 #[derive(Debug)]
 pub struct NativeExecutor<D> {
 	/// Dummy field to avoid the compiler complaining about us not using `D`.
-	_dummy: ::std::marker::PhantomData<D>,
+	_dummy: std::marker::PhantomData<D>,
 	/// Method used to execute fallback Wasm code.
 	fallback_method: WasmExecutionMethod,
 	/// Native runtime version info.
@@ -92,15 +92,45 @@ impl<D: NativeExecutionDispatch> NativeExecutor<D> {
 		}
 	}
 
+	/// Execute the given closure `f` with the latest runtime (based on the `CODE` key in `ext`).
+	///
+	/// The closure `f` is expected to return `Err(_)` when there happened a `panic!` in native code
+	/// while executing the runtime in Wasm. If a `panic!` occurred, the runtime is invalidated to
+	/// prevent any poisoned state. Native runtime execution does not need to report back
+	/// any `panic!`.
+	///
+	/// # Safety
+	///
+	/// `runtime` and `ext` are given as `AssertUnwindSafe` to the closure. As described above, the
+	/// runtime is invalidated on any `panic!` to prevent a poisoned state. `ext` is already
+	/// implicitly handled as unwind safe, as we store it in a global variable while executing the
+	/// native runtime.
 	fn with_runtime<E, R>(
 		&self,
 		ext: &mut E,
-		f: impl for <'a> FnOnce(&'a mut dyn WasmRuntime, &'a mut E) -> Result<R>,
+		f: impl for<'a> FnOnce(
+			AssertUnwindSafe<&'a mut (dyn WasmRuntime + 'static)>,
+			AssertUnwindSafe<&'a mut E>,
+		) -> Result<Result<R>>,
 	) -> Result<R> where E: Externalities {
 		RUNTIMES_CACHE.with(|cache| {
 			let mut cache = cache.borrow_mut();
-			let runtime = cache.fetch_runtime(ext, self.fallback_method, self.default_heap_pages)?;
-			f(runtime, ext)
+			let (runtime, code_hash) = cache.fetch_runtime(
+				ext,
+				self.fallback_method,
+				self.default_heap_pages,
+			)?;
+
+			let runtime = AssertUnwindSafe(runtime);
+			let ext = AssertUnwindSafe(ext);
+
+			match f(runtime, ext) {
+				Ok(res) => res,
+				Err(e) => {
+					cache.invalidate_runtime(self.fallback_method, code_hash);
+					Err(e)
+				}
+			}
 		})
 	}
 }
@@ -125,7 +155,7 @@ impl<D: NativeExecutionDispatch> RuntimeInfo for NativeExecutor<D> {
 		&self,
 		ext: &mut E,
 	) -> Option<RuntimeVersion> {
-		match self.with_runtime(ext, |runtime, _ext| Ok(runtime.version())) {
+		match self.with_runtime(ext, |runtime, _ext| Ok(Ok(runtime.version()))) {
 			Ok(version) => version,
 			Err(e) => {
 				warn!(target: "executor", "Failed to fetch runtime: {:?}", e);
@@ -141,8 +171,8 @@ impl<D: NativeExecutionDispatch> CodeExecutor for NativeExecutor<D> {
 	fn call
 	<
 		E: Externalities,
-		R:Decode + Encode + PartialEq,
-		NC: FnOnce() -> result::Result<R, String> + UnwindSafe
+		R: Decode + Encode + PartialEq,
+		NC: FnOnce() -> result::Result<R, String> + UnwindSafe,
 	>(
 		&self,
 		ext: &mut E,
@@ -152,7 +182,7 @@ impl<D: NativeExecutionDispatch> CodeExecutor for NativeExecutor<D> {
 		native_call: Option<NC>,
 	) -> (Result<NativeOrEncoded<R>>, bool){
 		let mut used_native = false;
-		let result = self.with_runtime(ext, |runtime, ext| {
+		let result = self.with_runtime(ext, |mut runtime, mut ext| {
 			let onchain_version = runtime.version();
 			match (
 				use_native,
@@ -170,9 +200,16 @@ impl<D: NativeExecutionDispatch> CodeExecutor for NativeExecutor<D> {
 							.as_ref()
 							.map_or_else(||"<None>".into(), |v| format!("{}", v))
 					);
-					runtime.call(ext, method, data).map(NativeOrEncoded::Encoded)
+
+					safe_call(
+						move || runtime.call(&mut **ext, method, data).map(NativeOrEncoded::Encoded)
+					)
 				}
-				(false, _, _) => runtime.call(ext, method, data).map(NativeOrEncoded::Encoded),
+				(false, _, _) => {
+					safe_call(
+						move || runtime.call(&mut **ext, method, data).map(NativeOrEncoded::Encoded)
+					)
+				},
 				(true, true, Some(call)) => {
 					trace!(
 						target: "executor",
@@ -184,11 +221,13 @@ impl<D: NativeExecutionDispatch> CodeExecutor for NativeExecutor<D> {
 					);
 
 					used_native = true;
-					with_native_environment(ext, move || (call)())
+					let res = with_native_environment(&mut **ext, move || (call)())
 						.and_then(|r| r
 							.map(NativeOrEncoded::Native)
 							.map_err(|s| Error::ApiError(s.to_string()))
-						)
+						);
+
+					Ok(res)
 				}
 				_ => {
 					trace!(
@@ -199,7 +238,7 @@ impl<D: NativeExecutionDispatch> CodeExecutor for NativeExecutor<D> {
 					);
 
 					used_native = true;
-					D::dispatch(ext, method, data).map(NativeOrEncoded::Encoded)
+					Ok(D::dispatch(&mut **ext, method, data).map(NativeOrEncoded::Encoded))
 				}
 			}
 		});
diff --git a/core/executor/src/wasm_runtime.rs b/core/executor/src/wasm_runtime.rs
index 8d2291fe048932cedf247cf5c05c02a5f8d5a8fd..29a6c51e39d3b1dce1258c3b5e9b442bb504bd12 100644
--- a/core/executor/src/wasm_runtime.rs
+++ b/core/executor/src/wasm_runtime.rs
@@ -23,7 +23,7 @@ use crate::error::{Error, WasmError};
 use crate::wasmi_execution;
 use log::{trace, warn};
 use codec::Decode;
-use primitives::{storage::well_known_keys, traits::Externalities};
+use primitives::{storage::well_known_keys, traits::Externalities, H256};
 use runtime_version::RuntimeVersion;
 use std::{collections::hash_map::{Entry, HashMap}};
 
@@ -99,9 +99,8 @@ impl RuntimesCache {
 	///
 	/// # Return value
 	///
-	/// If no error occurred a tuple `(wasmi::ModuleRef, Option<RuntimeVersion>)` is
-	/// returned. `RuntimeVersion` is contained if the call to `Core_version` returned
-	/// a version.
+	/// If no error occurred a tuple `(&mut WasmRuntime, H256)` is
+	/// returned. `H256` is the hash of the runtime code.
 	///
 	/// In case of failure one of two errors can be returned:
 	///
@@ -114,7 +113,7 @@ impl RuntimesCache {
 		ext: &mut E,
 		wasm_method: WasmExecutionMethod,
 		default_heap_pages: u64,
-	) -> Result<&mut (dyn WasmRuntime + 'static), Error> {
+	) -> Result<(&mut (dyn WasmRuntime + 'static), H256), Error> {
 		let code_hash = ext
 			.original_storage_hash(well_known_keys::CODE)
 			.ok_or(Error::InvalidCode("`CODE` not found in storage.".into()))?;
@@ -131,7 +130,7 @@ impl RuntimesCache {
 					if !cached_runtime.update_heap_pages(heap_pages) {
 						trace!(
 							target: "runtimes_cache",
-							"heap_pages were changed. Reinstantiating the instance"
+							"heap_pages were changed. Reinstantiating the instance",
 						);
 						*result = create_wasm_runtime(ext, wasm_method, heap_pages);
 						if let Err(ref err) = result {
@@ -152,9 +151,23 @@ impl RuntimesCache {
 		};
 
 		result.as_mut()
-			.map(|runtime| runtime.as_mut())
+			.map(|runtime| (runtime.as_mut(), code_hash))
 			.map_err(|ref e| Error::InvalidCode(format!("{:?}", e)))
 	}
+
+	/// Invalidate the runtime for the given `wasm_method` and `code_hash`.
+	///
+	/// Invalidation of a runtime is useful when there was a `panic!` in native while executing it.
+	/// The `panic!` maybe have brought the runtime into a poisoned state and so, it is better to
+	/// invalidate this runtime instance.
+	pub fn invalidate_runtime(
+		&mut self,
+		wasm_method: WasmExecutionMethod,
+		code_hash: H256,
+	) {
+		// Just remove the instance, it will be re-created the next time it is requested.
+		self.instances.remove(&(wasm_method, code_hash.into()));
+	}
 }
 
 /// Create a wasm runtime with the given `code`.
diff --git a/core/executor/src/wasmi_execution.rs b/core/executor/src/wasmi_execution.rs
index 2b832b490641de116ce03dc1adec41025f1d9c60..a83729b4b6c8d37cfeb8cc2a6709a9e7dab40a9b 100644
--- a/core/executor/src/wasmi_execution.rs
+++ b/core/executor/src/wasmi_execution.rs
@@ -16,7 +16,7 @@
 
 //! Implementation of a Wasm runtime using the Wasmi interpreter.
 
-use std::{str, mem};
+use std::{str, mem, panic::AssertUnwindSafe};
 use wasmi::{
 	Module, ModuleInstance, MemoryInstance, MemoryRef, TableRef, ImportsBuilder, ModuleRef,
 	memory_units::Pages, RuntimeValue::{I32, I64, self},
@@ -625,9 +625,14 @@ pub fn create_instance<E: Externalities>(ext: &mut E, code: &[u8], heap_pages: u
 				",
 		);
 
-	let version = call_in_wasm_module(ext, &instance, "Core_version", &[])
-		.ok()
-		.and_then(|v| RuntimeVersion::decode(&mut v.as_slice()).ok());
+	let mut ext = AssertUnwindSafe(ext);
+	let call_instance = AssertUnwindSafe(&instance);
+	let version = crate::native_executor::safe_call(
+		move || call_in_wasm_module(&mut **ext, *call_instance, "Core_version", &[])
+				.ok()
+				.and_then(|v| RuntimeVersion::decode(&mut v.as_slice()).ok())
+	).map_err(WasmError::Instantiation)?;
+
 	Ok(WasmiRuntime {
 		instance,
 		version,
diff --git a/core/wasm-interface/src/lib.rs b/core/wasm-interface/src/lib.rs
index b3cbde556eea0dbfe6c985c089706d9469a9d1e0..1e672606389007a690de92665522a96dd36b259b 100644
--- a/core/wasm-interface/src/lib.rs
+++ b/core/wasm-interface/src/lib.rs
@@ -180,7 +180,7 @@ pub trait Function {
 	fn execute(
 		&self,
 		context: &mut dyn FunctionContext,
-		args: &mut dyn Iterator<Item=Value>,
+		args: &mut dyn Iterator<Item = Value>,
 	) -> Result<Option<Value>>;
 }