Open arcticmatt opened 1 month ago
I'm currently having this problem trying to implement a library (mdx-editor
- that is using this package as a dependency) inside a chrome-extension - unsafe-eval
is not allowed there.
Thanks to your suggestion @arcticmatt, I monkey patched the library accordingly for my project - it works perfectly fine! I created this gist with the patch for anyone interested in a quick access: https://gist.github.com/Dari4sho/71d5ea6eae4d50352d4244e61ebe4c6e
We at Framer are also running into this and now thinking of maybe forking for this reason
Bug report
Packages affected
Description of the problem
This code uses
eval("this")
. AFAICT this is unnecessary, and we could instead do something like:With the current approach, if you use
SandpackPreview
, it will raise an error unlessunsafe-eval
is included in your CSP. It would be better ifSandpackPreview
was usable without making the CSP less safe.@danilowoz I saw you introduced this code, curious for your thoughts here—I might be missing something about why
eval("this")
is used.