Hi I just studied HTML5 CSP content security policy <http://www.html5rocks.com/en/tutorials/security/content-security-policy/> where inline code and eval is considered harmful. It's allso "Bad part " by Douglas crockford <http://javascript.crockford.com/> So I just scaned a repo for eval. There are some parts where eval is obviously needed (in playground ....). But there are also some evals that can be safely replaced by direct code. Like eval('some_expression') with some_expression.
regards FranĨek -- View this message in context: http://qooxdoo.678.n2.nabble.com/Use-of-eval-in-framework-tp7582238p7582249.html Sent from the qooxdoo mailing list archive at Nabble.com. ------------------------------------------------------------------------------ LogMeIn Rescue: Anywhere, Anytime Remote support for IT. Free Trial Remotely access PCs and mobile devices and provide instant support Improve your efficiency, and focus on delivering more value-add services Discover what IT Professionals Know. Rescue delivers http://p.sf.net/sfu/logmein_12329d2d _______________________________________________ qooxdoo-devel mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/qooxdoo-devel
