When we run automated security scan against our GWT project, one of the 
main vulnerability is related to the presence of eval() functions in 
the xxxx.nocache.js file

...{j=k.substring(Z,m);l=k.substring(m+$)}else{j=k;l=fb}c[j]=l}}else 
if(j==xb){k=i.getAttribute(vb);if(k){try{d=*eval(k)*}catch(a){alert(yb+k+zb)}}}else
 
if(j==Ab){k=i.getAttribute(vb);if(k){try{e=*eval(k)*}catch(a){alert(yb+k+Bb)}}}}}__gwt_getMetaProperty=function(a){var
 
b=c[a];return b==null?null:b};w=d;ipmweb.__errFn=e}...

We added the CSP that blocks eval executions and the application runs 
correctly, meaning that those eval() is not called at runtime.

Is there a way to get rid of those eval() functions? Is there someone who 
knows in which cases those eval() gets executed? 

-- 
You received this message because you are subscribed to the Google Groups "GWT 
Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/google-web-toolkit/c55d87d6-1107-4e37-9eb0-02601954c77an%40googlegroups.com.

Reply via email to