{
"author": {
"name": "Felix Geisendörfer",
"email": "felix@debuggable.com",
"url": "http://debuggable.com/"
},
"name": "active-x-obfuscator",
"description": "A module to (safely) obfuscate all occurrences of the string 'ActiveX' inside any JavaScript code.",
"version": "0.0.1",
"homepage": "https://github.com/felixge/node-active-x-obfuscator",
"repository": {
"type": "git",
"url": "git://github.com/felixge/node-active-x-obfuscator.git"
},
"main": "./index",
"scripts": {
"test": "node test.js"
},
"engines": {
"node": "*"
},
"dependencies": {
"zeparser": "0.0.5"
},
"devDependencies": {},
"optionalDependencies": {},
"readme": "# active-x-obfuscator\n\nA module to (safely) obfuscate all occurrences of the string 'ActiveX' inside\nany JavaScript code.\n\n## Why?\n\nSome corporate firewalls /proxies such as Blue Coat block JavaScript files to be\ndownloaded if they contain the word `'ActiveX'`. That of course is very annoying\nfor libraries such as [socket.io][] that need to use `ActiveXObject` for\nsupporting IE8 and older.\n\n## Install\n\n```\nnpm install active-x-obfuscator\n```\n\n## Usage\n\n```js\nvar activeXObfuscator = require('active-x-obfuscator');\nvar code = 'foo(new ActiveXObject());';\n\nvar obfuscated = activeXObfuscator(code);\n// -> foo(new window[(['Active'].concat('Object').join('X'))])\n```\n\n## License\n\nLicensed under the MIT license.\n\n[socket.io]: http://socket.io/\n",
"readmeFilename": "Readme.md",
"_id": "active-x-obfuscator@0.0.1",
"_from": "active-x-obfuscator@0.0.1"
}
|