-
Notifications
You must be signed in to change notification settings - Fork 37
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
safe-eval critical vulnerability is fixed? #10
Comments
We problably need to notify npm about that |
@kauegimenes is there any progress on notifying npm? we are still getting the vulnerability warning, can anyone let them know? |
@CesarLanderos there are still ways to circumvent the safety measures in The package is very much safe to be used for evaluation code generated by yourself. It can be dangerous where the input is user-submitted/manipulated by a user. |
Hmm, seems to limit its usefulness... |
We have updated the advisory to state that 0.4.0 and later are safe related to this advisory. |
Thanks @evilpacket =) |
|
It has never been fixed and will likely never been. See #16. |
I think @hacksparrow just needs to be very much clearer on what use-cases this is able to make safer, and flag very clearly in the description that user-submitted code is not one of them.
|
To me, it seems like there is no use case at the moment. If I can assume that the input isn't malicious, I could just feed it to eval. |
I guess if you're making something like a live-coding or visual programming app or something like that, then you could be generating code from user input with certain constraints such that you believe it is impossible to generate something unsafe and use this as a bit of an extra measure or something... but I'm clutching at straws. |
have you tried this damn case:
|
https://www.npmjs.com/package/safe-eval
However, after installing safe-eval 0.4.1 I see this in npm audit:
https://nodesecurity.io/advisories/337
The text was updated successfully, but these errors were encountered: