it is highly secure as the code is analyzed before executing to make sure it won't do anything macilious.
That's not highly secure. That's a challenge.
Given that Zones can have:
different login identities
different network interfaces
different hardware available to them (disks, adapters, etc.)
be configured to use resource pools thus different amounts of cpu, floating or fixed
Yes, I'd say they are much more useful than chroot.
To be a kind of moral Unix, he touched the hem of Nature's shift. -- Shelley