Skip to content

Conversation

RenFraser
Copy link

When 'unsafe-eval' is used on a web page, cypress-axe can't run because the injectAxe() function calls window.eval().

From the Mozilla docs:

Warning: Executing JavaScript from a string is an enormous security risk. It is far too easy for a bad actor to run arbitrary code when you use eval(). See Never use eval()!, below.

This commit updates the injectAxe() function to remove eval so that users of unsafe-eval can still use cypress-axe without having to override the injectAxe() function.

@dbengtsson
Copy link

Bump :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants