After a pentest using OWASP ZAP reported to find "eval" in file feather.min.js, which according to it, it's a dangerous JS function. To see that it also included in CDN version of feathericons in cloudflare and any other CDN provider, how can I convince my client that using feathericons is safe?
After a pentest using OWASP ZAP reported to find "eval" in file feather.min.js, which according to it, it's a dangerous JS function. To see that it also included in CDN version of feathericons in cloudflare and any other CDN provider, how can I convince my client that using feathericons is safe?