You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* From [MDN](<(https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/eval)**>): Executing JavaScript from a string is an enormous security risk. It is far too easy
295
-
* for a bad actor to run arbitrary code when you use eval(). Never use eval()!
296
-
*
297
-
* Wraps defined functions within eval statements.
298
-
*
299
-
* - **`false`** - Avoids using the `eval` function. _Default_.
300
-
* - **`true`** - Wraps function's code into an `eval` statement.
* [See all settings here](https://github.com/MichaelXF/js-confuser/blob/master/README.md#options)
313
-
*/
314
-
eval?: ProbabilityMap<boolean>;
315
-
316
256
/**
317
257
* ### `rgf`
318
258
*
319
259
* RGF (Runtime-Generated-Functions) uses the [`new Function(code...)`](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Function/Function) syntax to construct executable code from strings. (`"all"/true/false`)
320
260
*
321
-
* - **This can break your code. This is also as dangerous as `eval`.**
261
+
* - **This can break your code.
322
262
* - **Due to the security concerns of arbitrary code execution, you must enable this yourself.**
323
263
* - The arbitrary code is also obfuscated.
324
264
*
325
-
* | Mode | Description |
326
-
* | --- | --- |
327
-
* | `"all"` | Recursively applies to every scope (slow) |
0 commit comments