-
-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Eventually drop eval
?
#44
Comments
if there's an alternative to The thing is, the data serialization format is in JS, so there's just no way we can evaluate those scripts without using |
Closed because no |
I'm assuming any direct workaround like Indirectly, perhaps Seroval could be loaded in a webworker/iframe on a different origin where There's a Finally, there's tRPC. |
You had me at "webworker". Seroval isn't just a server-client serialization library, it's a runtime-to-runtime serialization library. |
eval
is used here, which unfortunately causes an error in sites which have a strict Content-Security-Policy. AFAIK the only way to get around this is to addunsafe-eval
to the CSP, which, as the name suggests, is unsafe.Is there any plan to move away from
eval
? Looking at the complexity of e.g. https://github.com/lxsmnsyc/seroval/blob/main/packages/seroval/src/core/context/serializer.ts I'm pretty sure the answer is "no", but thought I should ask anyway.The text was updated successfully, but these errors were encountered: