It's not necessarily that bad provided you know what context you're using it in.
If your application is using eval()
to create an object from some JSON which has come back from an XMLHttpRequest to your own site, created by your trusted server-side code, it's probably not a problem.
Untrusted client-side JavaScript code can't do that much anyway. Provided the thing you're executing eval()
on has come from a reasonable source, you're fine.