no-implied-eval
Configuration
rslint.config.ts
Rule Details
Disallows the use of eval()-like methods. Functions such as setTimeout, setInterval, setImmediate, and execScript can accept a string argument that is evaluated as code, similar to eval(). This is dangerous because it can execute arbitrary code and makes the application vulnerable to injection attacks. This rule also disallows using the Function constructor to dynamically create functions from strings.
Examples of incorrect code for this rule:
Examples of correct code for this rule: