@netskaven I'm curious, how do you mean that you would be tracked just by running javascript (as a remote party connects your Tor Browser session with your personal internet connection)?
The Tor Browser normalises lots of data that is possible to request via javascript, such as your screen resolution (it gets overwritten with the window's size, which they explicitly warn you about if you resize it) and stuff like HTML5 canvas data (possible GPU profiling) requires explicit activation when requested.
Do you have any concrete method of "original user identification" (or whatever it's called) that the Tor Browser (i.e. specifically that software, not just any browser using tor) is susceptible to if Google can run javascript? I'm sure the development team would be happy to hear about it and fix the bug.