Every line of '$var in javascript' code snippets is scanned for vulnerabilities by our powerful machine learning engine that combs millions of open source libraries, ensuring your JavaScript code is secure.
90 export function getVar(v: VarName, vars: Vars): SMTInput { 91 if (!(v in vars)) return v + "_0"; 92 return v + "_" + vars[v]; 93 }
516 function _jsEval(code, returnOrNot) { 517 "use strict"; 518 519 if (util.trim(code) === '') { 520 return emptyStr; 521 } 522 523 var scope = {}; 524 525 var functionName = util.guid('eval'); 526 527 code = 'scope["' + functionName + '"]=function(){' + 528 (returnOrNot ? 'return (' : '') + 529 code + 530 (returnOrNot ? ');' : '') +'}'; 531 532 try { 533 eval(code); 534 } catch (e) { 535 log.error(e.message); 536 return emptyStr; 537 } 538 539 return scope[functionName](); 540 541 }
457 function $script_create(url) { 458 return ''; 459 }
56 +function javascript() { 57 var err = getError('javascript') 58 if (!err.length && ++jsCount < max) return setTimeout(javascript, 1000) 59 60 t.equal(err.length, 1, 'javascript editor shows one error') 61 t.equal(err.line, '5', 'on line 5') 62 }()