AUTHENTICATED POST-DEPLOYMENT CONTROL
JS OBFUSCATION
Transform readable JavaScript into protected code. All processing happens locally. Your code never leaves your machine.
QUICK START
# Install
npm install -g @sekyuriti/cloak
# Login
cloak login
# Protect
cloak protect app.js
0
UPLOADS
2
TIERS
1
CLI
TRANSFORMATION
Variable names are randomized. Strings are encrypted. Control flow is flattened. The logic remains. The readability does not.
function calculateTotal(items) {
let total = 0;
for (const item of items) {
total += item.price * item.quantity;
}
return total;
}
const API_KEY = "sk_live_abc123";
const config = { debug: true };Basic obfuscation. Variable renaming. String encryption. Unlimited local usage.
Advanced protection. Domain lock. Anti-debugging. Anti-tampering. Violation telemetry.
Login via browser. CLI receives API key. Tier is verified.
Code is processed locally. Nothing leaves your machine. Output is generated.
Protected file is ready. Pro features inject runtime checks. Violations are reported.
PRO FEATURES
Pro tier injects runtime checks into your code. Domain lock ensures code only runs on approved domains. Violations are logged to your dashboard.
VIOLATION DASHBOARD
cloak login
Authenticate via browser
cloak logout
Clear local credentials
cloak protect <file>
Obfuscate a JavaScript file
cloak protect <file> -o out.js
Specify output file
cloak status
Show login status and tier
cloak --help
Show all commands
GET STARTED
GET API KEY