Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
A JavaScript interpreter written in JavaScript.
You might be working in a JavaScript environment where eval()
isn't
allowed (and you have a genuinely good reason why you want to use it).
Maybe this'll slip under the radar. You could also extend this to make
it execute ES6 code in an ES5 environment. PRs welcome!
Most of the heavy lifting is done by acorn, a JavaScript parser written in JavaScript. eval.js converts the AST it generates into JavaScript function closures, which when run execute the whole program.
It's also possible to use eval.js with esprima.
evaljs.evaluate(code)
A drop in alternative for window.eval()
.new evaljs.Environment([scopesOrGlobalObject])
Generates a new JS Environment to 'run' code in. The argument can be
one of the following:
require()
,
exports
, and module
.)15.4kB min+gzip
ISC
No labeled statements; no nice error handling; there are probably bugs. That said, it can run itself so it's supported subset of JS is usable. PRs welcome!
Not sure. I only tested with small snippets so far in Node.js, for which the speed difference isn't notable. But it's probably slow.
eval.js is written by Marten de Vries. Credits for the original idea go to closure-interpreter.
FAQs
A JavaScript interpreter written in JavaScript
We found that evaljs demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.