-
Notifications
You must be signed in to change notification settings - Fork 35
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Shuffle option causes Antiviruses to find Trojan #146
Comments
Version I use: 1.7.1 |
Hmm, this is pretty interesting. By the way, I have noticed that some antiviruses redefine fetch function and some shadowDOM stuff. |
Without "shuffle" option in Obfuscator configuration I cannot reproduce this issue. |
this is not the fault of the library this obfuscates code wich makes it impossible to read it to antivirus without VM analysis so some of them just trigers as virus. |
It's hard to control when Antiviruses decide to flag. Sometimes they flag when the code simply looks obfuscated (hexadecimal variables, encrypted strings, etc). Also, the shuffle: "hash" option is removed in 2.0 (currently 2.0.0-alpha.2) I would suggest not using the shuffle: "hash" option, it's not a powerful obfuscation after all. |
Describe the bug:
For example, use https://www.virustotal.com/gui/home/upload to check for viruses through obfucsated javascript files. With shuffle: "hash" configuration it finds the viruses stably.
Config and Small code sample
Config:
Expected behavior
There are no viruses found in obfuscated code.
Actual behavior
There are viruses found in obfuscated code.
Additional context
I don't know if it would be helpful, but similar problem with javascript-obfuscator package described here: javascript-obfuscator/javascript-obfuscator#51
The text was updated successfully, but these errors were encountered: