I ended up looking at this question as I was using evals in my current piece of code.
Why is using the JavaScript eval function a bad idea?
When you have javascript code in the browser, you download the javascript as part of the HTML or as a separate file. The source code is there for anyone to look at and modify. I don't see how injection attacks via an eval() could be any worse than hacking at the source code and altering that to do what the attacker wants.
Can someone explain what I am missing? Or some scenario where an eval is dangerous, that couldn't (easily) be achieved by altering the source code.