Hi,
We are using SonarQube quality analysis tool. The tool shows vulnerability alert on hands on table plugin file handsontable.full.js . The message is as follows
The eval function is a way to run arbitrary code at run-time. Generally it is considered to be very dangerous because it allows execution of arbitrary code. Its use is thus discouraged. If you have carefully verified that there is no other option than to use this construct, pay special attention not to pass any user-provided data into it without properly validating it beforehand.
Is this true that eval function is vulnerable? Is there any alternatives or new updates?