-
Notifications
You must be signed in to change notification settings - Fork 248
Open
Labels
Description
We are building a BIM viewer on a fairly large Enterprise setting.
As a big company we have to ensure security and we are subject penetration tests. This means that we have a fairly closed-up Content Security Policy configuration.
When we tried to deploy our first prototype of the viewer, we found that we needed to enable 'unsafe-eval' on CSP.
Since we know that the use of eval features it's largely a bad practice, is it possible get rid of that? Would be really important as it open the door for the execution of malicious code. ;)
Error loading IFC.
EvalError: Refused to evaluate a string as JavaScript because 'unsafe-eval' is not an allowed source of script in the following Content Security Policy directive: "default-src 'self'".
at new Function (<anonymous>)
at HC (web-ifc-api.js:9018:18)
at N_ (web-ifc-api.js:9021:28)
at o (web-ifc-api.js:10895:51)
at n.<anonymous> (web-ifc-api.js:52752:33)
at l (regeneratorRuntime.js:86:1)
at Vt._invoke (regeneratorRuntime.js:66:1)
at Generator.next (regeneratorRuntime.js:117:1)
at web-ifc-api.js:42:61
at new s (zone.js:1387:29)
wwwouter