Unsafe-eval JavaScript
Any graphics relying on eval() to execute dynamic code should have their JavaScript functions rewritten to avoid use of eval(). This is the preferred approach with respect to cyber-security.
Work-Around
It is possible, but not recommended, to disable the new security check in WebStation TGML graphics.
- Within WorkStation open the Control Panel
- Go to Security Settings
- Check the box for "Enable WebStation to use unsafe string evaluated JavaScript methods like 'eval'