Comparing version 0.0.1 to 0.0.3
@@ -9,8 +9,14 @@ { | ||
], | ||
"version": "0.0.1", | ||
"description": "", | ||
"main": "anbu.js", | ||
"version": "0.0.3", | ||
"description": "javascript encrypt&confusion", | ||
"main": "index.js", | ||
"scripts": { | ||
"test": "echo \"Error: no test specified\" && exit 1" | ||
}, | ||
"config": { | ||
"blanket": { | ||
"pattern": ["anbu/amdify.js", | ||
"anbu/src"] | ||
} | ||
}, | ||
"repository": { | ||
@@ -31,4 +37,11 @@ "type": "git", | ||
"dependencies": { | ||
"homunculus": "0.0.7" | ||
"homunculus": "0.1.7" | ||
}, | ||
"devDependencies": { | ||
"expect.js": "^0.3.1", | ||
"mocha": "^1.18.2", | ||
"blanket": "^1.1.6", | ||
"coveralls": "^2.10.0", | ||
"mocha-lcov-reporter": "0.0.1" | ||
} | ||
} |
@@ -1,2 +0,22 @@ | ||
anbu | ||
==== | ||
## anbu | ||
[![NPM version](https://badge.fury.io/js/anbu.png)](https://npmjs.org/package/anbu) | ||
[![Build Status](https://travis-ci.org/army8735/anbu.svg?branch=master)](https://travis-ci.org/army8735/anbu) | ||
[![Coverage Status](https://coveralls.io/repos/army8735/anbu/badge.png)](https://coveralls.io/r/army8735/anbu) | ||
[![Dependency Status](https://david-dm.org/army8735/anbu.png)](https://david-dm.org/army8735/anbu) | ||
使js代码极为难读,增加被破解的成本。由于浏览器宿主运行环境的关系,所有js都是公开的,无法加密,唯一的办法就是混淆使其不易阅读。 | ||
## INSTALL | ||
```js | ||
npm install anbu | ||
``` | ||
## API | ||
* anbu.encrypt(code:String, original:Boolean = false):String | ||
<br/>将js代码code混淆难度并返回,这并不会修改代码的任何逻辑 | ||
<br/>作为代价它会一定程度上增加js体积以及消耗更多的性能 | ||
<br/>original默认false会在代码前置入一段脚本,扩展原生对象,一般也是安全的,除非和代码本身的扩展冲突 | ||
<br/>original设置true时不会有上述扩展,但会减小混淆力度 |
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
Obfuscated code
Supply chain riskObfuscated files are intentionally packed to hide their behavior. This could be a sign of malware.
Found 1 instance in 1 package
Major refactor
Supply chain riskPackage has recently undergone a major refactor. It may be unstable or indicate significant internal changes. Use caution when updating to versions that include significant changes.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
Empty package
Supply chain riskPackage does not contain any code. It may be removed, is name squatting, or the result of a faulty package publish.
Found 1 instance in 1 package
346917
22
3345
22
5
2
7
21
+ Addedhomunculus@0.1.7(transitive)
- Removedhomunculus@0.0.7(transitive)
Updatedhomunculus@0.1.7