Package Exports
- safer-eval
This package does not declare an exports field, so the exports above have been automatically detected and optimized by JSPM instead. If any package subpath is missing, it is recommended to post an issue to the original package (safer-eval) to support the "exports" field. If that is not possible, create a JSPM override to customize the exports field for this package.
Readme
safer-eval
a safer eval
A safer approach for eval in node and browser. Before using this module, ask
yourself if there are no better options than using saferEval.
It is potentially better than the bad old eval()
but still has some harmful potential.
Especially when it comes to passing context
props.
Use clones to wrap-up the methods you allow. Check the "harmful context" tests.
Warning: The
saferEval
function may be harmful - so you are warned!
In node the vm
module is used to sandbox the evaluation of code
.
The browser version browser.js
might not be as safe as the node version
index.js
as here no real sandboxing is available.
Runs on node and in modern browsers:
Versions | |
---|---|
node | |
Chrome | 55, 56 |
Firefox | 45, 51 |
Edge | 13, 14 |
IE | |
Safari | 10 |
iOS Safari | 10 |
Installation
npm install --save safer-eval
Usage
context
allows the definition of passed in Objects into the sandbox.
Take care, injected code
can overwrite those passed context props!
Check the tests under "harmful context"!
Parameters
code: String
, a string containing javascript code
context: Object
, define globals, properties for evaluation context
Returns: Any
, evaluated code
Example:
in node:
var saferEval = require('safer-eval')
var code = `{d: new Date('1970-01-01'), b: new Buffer('data')}`
var res = saferEval(code, {Buffer: Buffer})
// => toString.call(res.d) = '[object Date]'
// => toString.call(res.b) = '[object Buffer]'
in browser:
var saferEval = require('safer-eval')
var code = `{d: new Date('1970-01-01'), b: function () { return navigator.userAgent }`
var res = saferEval(code, {navigator: window.navigator})
// => toString.call(res.d) = '[object Date]'
// => toString.call(res.b) = '[object Function]'
// => res.b() = "Mozilla/5.0 (..."
To minimize any harmful code injection carefully select the methods you allow in context
var code = `window.btoa('Hello, world')`
// AVOID passing a GLOBAL context!!!
var res = saferEval(code, {window: window})
// BETTER - code needs only access to window.btoa
const clones = require('clones')
var context = {
window: {
btoa: clones(window.btoa, window)
}
}
var res = saferEval(code ,context)
// => res = 'SGVsbG8sIHdvcmxk'