Open Limbo2332 opened 1 month ago
Version I use: 1.7.1
Hmm, this is pretty interesting. However, we cannot adjust obfuscator for antivirus needs. It is outside app, that doesn't use code directly. What if it will start to detect it every where? Also we have no idea what cause it.
By the way, I have noticed that some antiviruses redefine fetch function and some shadowDOM stuff.
Without "shuffle" option in Obfuscator configuration I cannot reproduce this issue.
this is not the fault of the library this obfuscates code wich makes it impossible to read it to antivirus without VM analysis so some of them just trigers as virus.
It's hard to control when Antiviruses decide to flag. Sometimes they flag when the code simply looks obfuscated (hexadecimal variables, encrypted strings, etc). Also, the shuffle: "hash" option is removed in 2.0 (currently 2.0.0-alpha.2)
I would suggest not using the shuffle: "hash" option, it's not a powerful obfuscation after all.
Describe the bug:
For example, use https://www.virustotal.com/gui/home/upload to check for viruses through obfucsated javascript files. With shuffle: "hash" configuration it finds the viruses stably.
Config and Small code sample
Config:
Expected behavior
There are no viruses found in obfuscated code.
Actual behavior
There are viruses found in obfuscated code.
Additional context
I don't know if it would be helpful, but similar problem with javascript-obfuscator package described here: https://github.com/javascript-obfuscator/javascript-obfuscator/issues/51