You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I know it is not very likely, but if an attacker can control one of the parameters to your module, it may do something like this:
mask.mask(model,['id"]; console["log"]("my evil code was run");//'])
My suggestions: get rid of eval by using the bracket notation, validate the input to eval by using some regex or use a more heavyweight sanitization package like: https://www.npmjs.com/package/eval-sanitizer
The text was updated successfully, but these errors were encountered:
In file index.js, the following uses of eval may have unexpected consequences:
I know it is not very likely, but if an attacker can control one of the parameters to your module, it may do something like this:
My suggestions: get rid of eval by using the bracket notation, validate the input to eval by using some regex or use a more heavyweight sanitization package like:
https://www.npmjs.com/package/eval-sanitizer
The text was updated successfully, but these errors were encountered: