You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
So this is supposed to be "a little project to undo several of the horrible things JavaScript build tools will do to JavaScript. In addition to undoing most minification, it reverses some of the stupider but surprisingly common "obfuscation" techniques used in the wild."
EXAMPLE Command>>> unminify test.html
test.html FILE CONTENTS FOR LINE 1
<script nonce="lGnaSYjF7VBCDwtjmM+Jrg">
var ytcfg={d:function(){return window.yt&&yt.config_||ytcfg.data_||(ytcfg.data_={})},get:function(k,o){return k in ytcfg.d()?ytcfg.d()[k]:o},set:function(){var a=arguments;if(a.length>1)ytcfg.d()[a[0]]=a[1];else for(var k in a[0])ytcfg.d
()[k]=a[0][k]}};
LOL! So if I throw js into an html file with embedded scripts, then I defeat your neat app for finding "stupider" and "surprisingly common" obfuscation techniques?!!! Now that is more "stupider" than "stupider" so I CALL BS! If your program relies on a perfectly written JS file vs. the many more simplistic ways of obfuscating js code like just doing something stupid like putting it in the html vs. a js script, then it is utterly useless to anyone.
Before you go there and say that I should have converted my code to a clean JS file vs. where it lives, have a look at this website. They do it cleanly and without fail for both html and js. https://unminify.com/
This program is precisely the reason why I say free open source is not really free. We end up spending hours of our valuable time figuring out why buggy code does not work the way it is intended and pulling our hair out trying to read awful documentation with cryptic messages only the mother or father of these ugly babies could love.
The text was updated successfully, but these errors were encountered:
So this is supposed to be "a little project to undo several of the horrible things JavaScript build tools will do to JavaScript. In addition to undoing most minification, it reverses some of the stupider but surprisingly common "obfuscation" techniques used in the wild."
EXAMPLE Command>>> unminify test.html
test.html FILE CONTENTS FOR LINE 1
<script nonce="lGnaSYjF7VBCDwtjmM+Jrg">var ytcfg={d:function(){return window.yt&&yt.config_||ytcfg.data_||(ytcfg.data_={})},get:function(k,o){return k in ytcfg.d()?ytcfg.d()[k]:o},set:function(){var a=arguments;if(a.length>1)ytcfg.d()[a[0]]=a[1];else for(var k in a[0])ytcfg.d
()[k]=a[0][k]}};
RESULTS:
/usr/local/lib/node_modules/unminify/node_modules/shift-parser/dist/parser.js:1831
throw this.createUnexpected(this.lookahead);
^
Error: [1:1]: Unexpected token "<"
LOL! So if I throw js into an html file with embedded scripts, then I defeat your neat app for finding "stupider" and "surprisingly common" obfuscation techniques?!!! Now that is more "stupider" than "stupider" so I CALL BS! If your program relies on a perfectly written JS file vs. the many more simplistic ways of obfuscating js code like just doing something stupid like putting it in the html vs. a js script, then it is utterly useless to anyone.
Before you go there and say that I should have converted my code to a clean JS file vs. where it lives, have a look at this website. They do it cleanly and without fail for both html and js. https://unminify.com/
This program is precisely the reason why I say free open source is not really free. We end up spending hours of our valuable time figuring out why buggy code does not work the way it is intended and pulling our hair out trying to read awful documentation with cryptic messages only the mother or father of these ugly babies could love.
The text was updated successfully, but these errors were encountered: