Obfuscation Detector is a tool for identifying different types of JavaScript obfuscation by analyzing the code's Abstract Syntax Tree (AST). It is designed for security researchers, reverse engineers, and developers who need to quickly determine if and how a JavaScript file has been obfuscated.
For comments and suggestions feel free to open an issue or find me on LinkedIn
Obfuscation Detector parses JavaScript code into an AST using flAST and applies a series of modular detectors. Each detector reports a binary true/false result and can explicitly declare which less-inclusive detections it should suppress in reduced output.
npm install obfuscation-detectorimport fs from 'node:fs';
import {
detectObfuscation,
detectObfuscationDetailed,
detectObfuscationReduced,
} from 'obfuscation-detector';
const code = fs.readFileSync('obfuscated.js', 'utf-8');
const rawMatches = detectObfuscation(code);
const reducedMatches = detectObfuscationReduced(code);
const detailedMatches = detectObfuscationDetailed(code);
console.log(`Raw detections: ${rawMatches.join(', ')}`);
console.log(`Reduced detections: ${reducedMatches.join(', ')}`);
console.log(detailedMatches);obfuscation-detector /path/to/obfuscated.js [--reduced|-r] [--detailed|-d] [--json|-j]
cat /path/to/obfuscated.js | obfuscation-detector [--reduced|-r] [--detailed|-d] [--json|-j]
obfuscation-detector --help--reduced,-r: Return only detections that are not prioritized over by another detected type.--detailed,-d: Return detections withprioritizeOverandsuppressedBymetadata.--json,-j: Print the selected output mode as JSON.--help,-h: Show usage instructions.- Unknown flags will result in an error and print the usage.
- Raw detections:
$ obfuscation-detector /path/to/obfuscated.js [+] function_to_array_replacements, augmented_proxied_array_function_replacements
- Reduced detections:
$ obfuscation-detector /path/to/obfuscated.js --reduced [+] augmented_proxied_array_function_replacements
- Detailed text output:
$ obfuscation-detector /path/to/obfuscated.js --detailed [+] augmented_array_function_replacements prioritizeOver: array_function_replacements suppressedBy: (none) - Detailed JSON output:
$ cat obfuscated.js | obfuscation-detector --detailed --json [ { "name": "augmented_array_function_replacements", "prioritizeOver": ["array_function_replacements"], "suppressedBy": [] } ]
- code: JavaScript source code as a string.
- Returns: All detected obfuscation type names.
- code: JavaScript source code as a string.
- Returns: Only detections that are not suppressed by another detected type's
prioritizeOvergraph.
- code: JavaScript source code as a string.
- Returns: Detection results with deterministic priority metadata.
name: stringprioritizeOver: string[]suppressedBy: string[]
prioritizeOverexpresses structural inclusiveness, not confidence or likelihood.- Raw output returns every true detection.
- Reduced output suppresses any detection dominated by another true detection.
- Example:
augmented_array_replacementscan prioritize overarray_replacements, because the augmented pattern includes the array-replacement pattern.
Descriptions and technical details for each type are available in src/detectors/README.md:
- Array Replacements
- Augmented Array Replacements
- Array Function Replacements
- Augmented Array Function Replacements
- Function To Array Replacements
- Obfuscator.io
- Caesar Plus
- No obfuscation detected: The code may not be obfuscated, or it uses an unknown technique. Consider contributing a new detector!
- Error: File not found: Check the file path and try again.
- Unknown flag: Run with only
--helpto see what options are available. - Performance issues: For very large files, detection may take longer because all detectors are evaluated for raw classification.
To contribute to this project, see our contribution guide.
For technical details on each obfuscation type and how to add new detectors, see src/detectors/README.md.