Skip to content

Detects "eval(variable)" which can allow an attacker to run arbitrary code inside your process (security/detect-eval-with-expression)

⚠️ This rule warns in the ✅ recommended config.

More information: What are the security issues with eval in JavaScript?

Released under the Apache License 2.0.