gitlab.eslint.detect-eval-with-expression

178
Download Count*
License

Detected eval(variable), which could allow a malicious actor to run arbitrary code.

Run Locally

Run in CI

Defintion

rules:
  - id: eslint.detect-eval-with-expression
    metadata:
      cwe: "CWE-95: Improper Neutralization of Directives in Dynamically Evaluated
        Code ('Eval Injection')"
      owasp: "A1: Injection"
      source-rule-url: https://github.com/nodesecurity/eslint-plugin-security/blob/master/rules/detect-eval-with-expression.js
      primary_identifier: eslint.detect-eval-with-expression
      secondary_identifiers:
        - name: ESLint rule ID security/detect-eval-with-expression
          type: eslint_rule_id
          value: security/detect-eval-with-expression
      license: MIT
    message: >
      Detected eval(variable), which could allow a malicious actor to run
      arbitrary code.
    patterns:
      - pattern: eval($OBJ)
      - pattern-not: eval("...")
    severity: WARNING
    languages:
      - javascript
      - typescript