Anti-LLM Maximum mode in every paid tier — per-build polymorphic decoding from $29/mo · Compare plans
Try the online obfuscator Free preview · no signup · in your browser
Try Free
JavaScript Protection For Release Teams · Since 2004

Protect shipped JavaScript without slowing down the release flow around it.

Start with a browser preview, move into the desktop app when source must stay local, or wire the hosted API and npm CLI into CI. Maximum-mode polymorphic protection starts at $29/month.

Online preview No signup required Desktop path Source stays local Automation API + npm CLI available
Protect production code

Use stronger protection for shipped JavaScript, then move into desktop, API, or CLI workflows when the release process needs to scale.

JavaScript obfuscation visual
Preview Try the browser tool before changing your build flow.
Local Switch to desktop when code cannot leave the workstation.
Ship Carry the same preset into repeatable release automation.
2004 First shipped. Continuous releases for 22 years. Heritage
$29 = 1 GB Entry tier with anti-LLM Maximum mode included. Pricing
Per-build Polymorphic decoder regenerated every release. Anti-LLM
4 paths Online, desktop GUI, hosted API, npm CLI. Workflow
Trusted by product teams worldwide Some of the names that have shipped JavaScript Obfuscator-protected code in production since 2004.
Sony
Intel
Nokia
Siemens
IBM
Microsoft
Find Your Fit

Pick your threat model. We'll point you at the right preset.

The right amount of protection depends on what an attacker actually wants from your code. Pick one and the recommendation appears below.

Recommended: Standard preset. Variable renaming and string encoding stop the casual copy-and-paste copycat. The Free tier is enough — no credit card required. Upgrade only if your usage grows beyond 200 MB/month.

Open Standard Preset ›

Recommended: Maximum preset. Per-build polymorphic decoder, encrypted constant pool, flat-transformed control flow, self-defending wrapper. The threshold an attacker has to cross becomes uneconomical for most non-state actors. Available in every paid tier from $29/month.

Open Maximum Preset ›

Recommended: Maximum preset + a runtime monitoring suite. Maximum mode raises the cost of analysis; runtime monitoring catches tampering when it happens. Server-side authority on anything that grants access. Obfuscation is one layer in a layered defense, never the only one.

Pricing

Published plans. Anti-LLM in every paid tier.

No sales call. No "contact us for pricing." Maximum-mode anti-LLM protection is included from the entry tier up — never gated to a higher plan.

Bytes per dollar at the entry tier

JavaScript Obfuscator
$29 → 1 GB / month
Comparable
$19 → 100 MB

10× the bytes per dollar. Anti-LLM Maximum mode included from $29.

Start free

Free

$0/month

A no-cost starting point for quick evaluations and basic obfuscation workflows.

Best for first previews

  • 200 MB monthly quota
  • 20 files per request
  • Name mangling
  • String encoding
Individual builds

Basic

$29/month

Maximum-mode protection for individual developers shipping active products.

Best for solo release flow

  • 1 GB monthly quota
  • 50 files per request
  • 10 MB max file size
  • Compression included
  • All Free features
High-volume pipelines

Enterprise

$99/month

Higher limits for larger release pipelines and broader file-processing capacity.

Best for larger throughput

  • 9 GB monthly quota
  • 3000 files per request
  • 120 MB max file size
  • Best compression ratio
  • All Corporate features

Compare all four plans in detail ›

The Question Every Procurement Reviewer Asks

What actually changes when the output shape is different on every release?

Short answer: no, for output that regenerates its decoder shape every build. Yes, for static obfuscators in their training data.

Every release changes the attack surface. Maximum mode regenerates the decoder shape, key path, and identifier prefix instead of shipping one static transform signature forever.
LLMs lose the shortcut they rely on. Pattern-matching works well against fixed obfuscators. It degrades when the next build is structurally different from the last one.
Runtime-decoded constants remove obvious clues. Strings, names, and readable branches stop acting like anchor points for reverse engineering and code explanation prompts.
Procurement-Ready

Get answers without a sales call.

Source-handling, release validation, compliance vocabulary, and workflow-to-policy fit are all documented. Your security team can review without scheduling a discovery meeting first.

Review pack ready Workflow and trust docs Local-only path included
In-memory processing Submitted JavaScript is processed in server memory only, and the desktop workflow keeps source on the workstation throughout.
Compliance vocabulary mapped GDPR data minimisation, OWASP A04/A09, PCI DSS 4.0 client-side script integrity, HIPAA-adjacent code, and NIST SSDF concerns are addressed in one place.
Honest scope No SOC 2 or ISO 27001 claims today. We publish the handling details, support path, release-validation guidance, and local-only option we do have.
Desktop App

Your source code never leaves your workstation.

For PHI-adjacent web apps, on-prem build pipelines, or any project where the JavaScript source code can't be uploaded to a third-party server — use the desktop GUI. Batch process entire projects, including JavaScript embedded in HTML, PHP, ASP, ASPX, and JSP. Generate a deterministic command line you can check into your release pipeline.

Mixed-file support for HTML, PHP, ASP, ASPX, and JSP Deterministic command line for release automation Local-only path for sensitive source code
JavaScript Obfuscator Desktop GUI
Scope Whole projects and embedded JavaScript
Output Repeatable command line for CI handoff
Security Source stays on the local workstation
Three Ways To Start

Pick the entry point that fits how your team actually ships.

Use the online tool for quick evaluation, move to desktop when source must stay local, or hand procurement and engineering the deeper docs when they need release-process details first.

Try the online obfuscator

Best when you want a fast before-and-after preview, a quick shareable test, or a lightweight way to compare presets.

Open the browser tool ›

Download the desktop app

Best for PHI-adjacent code, on-prem build systems, and mixed-file projects that need local-only processing.

Get the desktop installer ›

Review trust and workflow docs

Best when security reviewers, release managers, or procurement teams want handling details before testing the product directly.

Open security and workflow docs ›
Frequently Asked

The questions security reviewers and release managers ask first.

Plain answers on LLM resistance, recoverability, embedded JavaScript support, and what's in the lower-priced plans.

Can ChatGPT, Claude, or Copilot reverse-engineer code protected by JavaScript Obfuscator?
Maximum-mode protection emits a per-build polymorphic decoder. Every release regenerates the decoder shape, key derivation, identifier prefix, and constant-pool encoding. LLMs work by pattern-matching against known transform signatures, so an AI deobfuscator that solves one build cannot apply the same approach to the next.
Is the original source recoverable from the obfuscated output?
No. Once the symbols and comments are transformed, the original source cannot be recovered from the obfuscated output — not by hand, not by automated deobfuscators, not by LLM-based tools. Variable names, string contents, and structural cues are gone for good.
Can it protect JavaScript embedded in HTML, PHP, ASP, ASPX, or JSP files?
Yes. The desktop app processes mixed files end-to-end, including JavaScript inside HTML, PHP, ASP, ASPX, and JSP templates. The non-JS portions of each file pass through untouched while every <script> block and inline event handler runs through the obfuscation pipeline.
Is anti-LLM Maximum mode included in the lower-priced plans?
Yes. Maximum-mode anti-LLM protection — per-build polymorphic decoder, encrypted constants, flat-transformed control flow — is available in every paid tier starting at $29/month. It's not gated behind an enterprise upgrade or a separate add-on.
How do I integrate it into a CI/CD pipeline?
Three options depending on where your build runs. The desktop app generates a deterministic command line you commit alongside your project. The npm CLI drops into Node-based pipelines (npm install javascript-obfuscator) and accepts the same options as the GUI. The hosted HTTP+JSON API works for any pipeline that can issue HTTPS requests — no installation needed.
Will obfuscation break my code or hurt runtime performance?
Static transforms (renaming, string encoding, dead-code insertion) impose negligible overhead — typically under 5% on real workloads. The Maximum-mode decoder adds a one-time per-build cost on first execution that's typically a few milliseconds. We publish a benchmark methodology and run a compatibility analyzer that flags risky patterns (eval loops, dynamic property names) before the build commits.

Still have a question? Email [email protected] or browse the full documentation.

Open Documentation ›