frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Obfuscation is not security – AI can deobfuscate any minified JavaScript code

https://www.afterpack.dev/blog/claude-code-source-leak
33•rvz•2h ago

Comments

ryandrake•1h ago
I successfully did this the other day. There was a web app I used quite a bit with an annoying performance issue (in some cases its graphics code would spin my CPU at 100% constantly, fans full-blast). I asked Claude to fetch the code and fed it a few performance traces I took through Firefox, and it cut through all those obfuscated variables like they weren't even there, easily re-interpreting what each function actually did, finding a plausible root cause and workaround (which worked).

Can you generally trust it to de-obfuscate reliably? No idea. My sample size is 1.

josephg•1h ago
I did something similar yesterday. I'm playing a little idle game, and wanted to optimise my playthrough. I pointed claude at the game's data files, and in a few short minutes it reverse engineered the game data and extracted it to CSV / JSON files for analysis.

In this case, it turned out the data - and source code for the game - was in a big minified javascript file. Claude extracted all the data I wanted in about 2 minutes.

durzo22•1h ago
write your blog yourself if ppl are supposed to read it not this llm slop
notepad0x90•1h ago
isn't it fair for an article about AI deobfuscating code to be written by AI?
socalgal2•1h ago
If it’s too hard to read ask your ai to deobfuscate it :D
Gigachad•1h ago
I expect it these days but it’s still disrespectful slop pushing out real work.
Retr0id•1h ago
Not really, no.
gertop•1h ago
Fair? No. Par for the course? Unfortunately yes.
notepad0x90•1h ago
It's a cat and mouse game, it provides the desired level of security for people who use it. It isn't used to prevent people from finding vulnerabilities (not mostly at least). It's used to deter competition, prevent clones of the application,etc.. it's make-shift "DRM". There are ways to defeat even AI-assisted analysis running in a proper browser. But I think it's not a good idea to give anyone ideas on this subject. proper-DRM is hellish enough.

Was there ever an obfuscated JS code a human couldn't reverse given enough time? It's like most people's doors, it won't stop someone with a battering ram, but it will ideally slow them down enough for you to hide or get your guns. in this case, it won't even slow them down, until it does (hence: cat and mouse game).

integralid•16m ago
>Was there ever an obfuscated JS code a human couldn't reverse given enough time?

I reverse malware for a living and no there wasn't. With some experience even the best obfuscation is actually pretty easy to defeat. But the goal of malware analysis is to extract some knowledge (what this code does, IPs, URLs, tokens). Getting a runnable, clean version would often be a long tedious work.

0x3f•1h ago
The _any_ part is not clear to me. Obfuscation is an arms race. Reverse engineers have always been tool-assisted. Now they just have new tools and the obfuscators need to catch up.
socalgal2•1h ago
And read through native code as well
tw04•1h ago
Huh? Their justification for "ofuscation isn't security" is by pointing out that the Claude source wasn't obfuscated, it was minified. And it could be "deobfuscated by claude itself" - even though, again, they said the code wasn't obfuscated.

So I guess, ask Claude to deobfuscate some code that's ACTUALLY OBFUSCATED if you want to claim obfuscation provides ZERO additional security.

>We analyzed this file at AfterPack as part of a deobfuscation case study. What we found: it's minified, not obfuscated.

>Here's the difference. Minification — what every bundler (esbuild, Webpack, Rollup) does by default — shortens variable names and removes whitespace. It makes code smaller for shipping. It was never designed to hide anything.

>Here's where it gets interesting. We didn't need source maps to extract Claude Code's internals. We asked Claude — Anthropic's own model — to analyze and deobfuscate the minified cli.js file.

what•4m ago
It seems pretty clearly ai written.
maxwg•1h ago
JS was never really obfuscated - it wasn't the goal of minification. Minifiers especially struggle with ES6 classes/etc, outputting code that is almost human readable.

Proper obfuscation libraries exist, typically at the cost of a pretty notable amount of performance that I'd wager most are not willing to sacrifice

And like even the best of client-side DRM, everything can be reverse engineered. All the code has been downloaded to the user's machine. It's one of the (IMO terrible) excuses for the SaaSification of all software

integralid•20m ago
minification was originally about sending less bytes on the wire and saving a bit of performance. Somewhere along the road people started misusing this for security, because JS evolved from "a few snippets of code to make my site more interactive" to SPAs
Retr0id•1h ago
Minification is not obfuscation and obfuscation is not security, but no amount of deobfuscation will recover the comments in the source, which are often more insightful than the source itself.
TurdF3rguson•1h ago
If the comments were in the original source that the model trained on... Then sure, those are recoverable too.
JollySharp0•44m ago
Obfuscation is meant to slow someone by making it difficult to understand. Slowing an attacker down is often employed as a form of security, that is why castles had walls, moats and multiple layers once you got inside to hinder progress.

It has been often used by companies, malware authors etc. to make it difficult for someone else to understand what is internally happening.

postalrat•24m ago
Often like 1 in 100 js files?
layer8•1h ago
> AfterPack approaches this differently. Instead of layering reversible transforms on top of each other, AfterPack uses non-linear, irreversible transforms — closer to how a hash function works than how a traditional obfuscator works. The output is functionally equivalent to the input, but the transformation destroys semantic meaning in a way that cannot be reversed — even by AfterPack itself. There's no inverse function. No secret key that unlocks the original.

That’s probably fun when trying to analyze bugs occurring in production. :)

Retr0id•1h ago
What they describe is snake oil. Even if you assume it is mathematically possible in the general case (which is debatable!), it'll likely have a huge performance overhead. See https://en.wikipedia.org/wiki/Indistinguishability_obfuscati...
throwup238•1h ago
What they’re describing is a polymorphic virus. A great analogy for SV startups.

It works great in assembly, not so much for higher level languages.

brookst•43m ago
Is all polymorphic code virii?
throwup238•33m ago
Not necessarily, but in practice no one has any use for the technique except to obfuscate viruses, with the exception of academic research.

The nonvirus equivalent is JITs which are present in all major browsers and tons of other runtimes, but they have no use for polymorphism except at a theoretical level.

sublinear•1h ago
> No one talks about this. There's no VentureBeat headline about GitHub shipping email addresses in their JS bundles. No Hacker News thread about internal URLs exposed in Anthropic's CDN scripts

That's a huge sign none of that information is truly sensitive. What is being implied here?

> AI Makes This Urgent

No it doesn't. This is blogspam and media hype nobody is interested in. Unless the demographics have really shifted that much in the last few years, HN is one of the worst places to attempt this marketing style.

motohagiography•1h ago
slight historical note, it might be interesting to see how the brief period of "white box cryptography" stands up to AI today. At the time there were a few companies with products that had trouble finding fit (for straightforward security reasons) but they were essentially commercial obfuscators that made heavy use of lookup tables, miniature virtual machines, and esolang concepts that worked mainly against human reverse engineers.

An example was this early AES proposal: https://link.springer.com/chapter/10.1007/3-540-36492-7_17

Retr0id•1h ago
Whitebox cryptography is widely deployed, in browser plugins for DRM.
mediumsmart•17m ago
JavaScript code is the essence of minified security.
throwaway9980•14m ago
Nicholson entered the mantrap and the double doors closed behind him. He emptied his pockets and disrobed before donning the clean suit that had been provided to him by the orderlies. The camera watching him appeared satisfied that he was properly prepared and, more to the point, that the vendor was properly protected. The doors to the inner chamber opened and he proceeded into the hallway. He passed several doors until he reached the one that was labeled with the name of the vendor. He pressed the button on the doorframe. A satisfying tactile click, a spinning light illuminating around the button, a click, and then the door opened soundlessly. A single desk with a small chair and a computer terminal awaited him. He sat down and the screen turned on automatically. Finally, he was able to set about classifying his expenses from a recent trip to Tokyo. It was inconvenient, but a small price to pay to ensure that the vendor’s unique interfaces, their intellectual property, couldn’t be copied by the replication machines. Their eyes and their ears were everywhere in the outside world. Simply by seeing your software, these machines could copy its essence. The risks of operating software in the wild required that proprietary software be protected. Hidden away from eavesdroppers. Such was the world in 2037.

Live: Artemis II Launch Day Updates

https://www.nasa.gov/blogs/missions/2026/04/01/live-artemis-ii-launch-day-updates/
638•apitman•8h ago•607 comments

A new C++ back end for ocamlc

https://github.com/ocaml/ocaml/pull/14701
87•glittershark•2h ago•4 comments

DRAM pricing is killing the hobbyist SBC market

https://www.jeffgeerling.com/blog/2026/dram-pricing-is-killing-the-hobbyist-sbc-market/
303•ingve•4h ago•235 comments

EmDash – A spiritual successor to WordPress that solves plugin security

https://blog.cloudflare.com/emdash-wordpress/
464•elithrar•9h ago•333 comments

Fast and Gorgeous Erosion Filter

https://blog.runevision.com/2026/03/fast-and-gorgeous-erosion-filter.html
65•runevision•1d ago•11 comments

IPv6 address, as a sentence you can remember

https://sentence2ipv6.tib3rius.com/
30•LorenDB•2h ago•24 comments

Show HN: Git bayesect – Bayesian Git bisection for non-deterministic bugs

https://github.com/hauntsaninja/git_bayesect
202•hauntsaninja•4d ago•26 comments

Quantum computing bombshells that are not April Fools

https://scottaaronson.blog/?p=9665
12•Strilanc•1h ago•0 comments

AI for American-produced cement and concrete

https://engineering.fb.com/2026/03/30/data-center-engineering/ai-for-american-produced-cement-and...
149•latchkey•8h ago•107 comments

Signing data structures the wrong way

https://blog.foks.pub/posts/domain-separation-in-idl/
74•malgorithms•6h ago•42 comments

Set the Line Before It's Crossed

https://nomagicpill.substack.com/p/set-the-line-before-its-crossed
27•surprisetalk•2d ago•7 comments

Ask HN: Who is hiring? (April 2026)

202•whoishiring•10h ago•161 comments

The revenge of the data scientist

https://hamel.dev/blog/posts/revenge/
91•hamelsmu•4d ago•17 comments

Show HN: Dull – Instagram Without Reels, YouTube Without Shorts (iOS)

https://getdull.app
40•kasparnoor•4h ago•25 comments

StepFun 3.5 Flash is #1 cost-effective model for OpenClaw tasks (300 battles)

https://app.uniclaw.ai/arena?tab=costEffectiveness&via=hn
142•skysniper•9h ago•61 comments

InspectMind AI (YC W24) Is Hiring

https://www.ycombinator.com/companies/inspectmind-ai/jobs/jQNra64-software-engineer-build-the-wor...
1•aakashprasad91•4h ago

SpaceX files to go public

https://www.nytimes.com/2026/04/01/technology/spacex-ipo-elon-musk.html
195•nutjob2•8h ago•251 comments

Scientists crack a 20-year nuclear mystery behind the creation of gold

https://www.sciencedaily.com/releases/2026/03/260313002633.htm
53•prabal97•6h ago•20 comments

ZomboCom stolen by a hacker, sold, now replaced with AI-generated makeover

https://old.reddit.com/r/oldinternet/comments/1raiz8v/zombocom_was_stolen_by_hacker_put_up_for_sa...
41•bananaboy•2h ago•19 comments

Show HN: Flight-Viz – 10K flights on a 3D globe in 3.5MB of Rust+WASM

https://flight-viz.com
59•coolwulf•8h ago•33 comments

Ariane 6 user's manual [pdf]

https://www.ariane.group/app/uploads/sites/4/2024/10/Mua-6_Issue-2_Revision-0_March-2021.pdf
35•matthieu_bl•4d ago•4 comments

Jax's true calling: Ray-Marching renderers on WebGL

https://benoit.paris/posts/jax-ray-marcher/
56•BenoitP•6h ago•8 comments

Swappa.com for GrapheneOS compatible devices – Stay Away

https://discuss.grapheneos.org/d/33727-swappacom-for-grapheneos-compatible-devices-stay-away
90•OsrsNeedsf2P•4h ago•57 comments

How-to guide: Commissioning a Sensor Physics R&D Lab

https://gist.github.com/nup002/912383615b12dc1ec44ae9004c40b11f
34•MagneLauritzen•2d ago•4 comments

Montana referendum to outlaw corporate campaign contributions [video]

https://www.youtube.com/watch?v=p1fPbGHe3xE
29•le-mark•2h ago•2 comments

SolveSpace (open source 2D/3D CAD) working on Windows 2000 (2025)

https://github.com/solvespace/solvespace/issues/1036
11•ruevs•3h ago•1 comments

The Windows equivalents of the most used Linux commands

http://techkettle.blogspot.com/2026/04/the-windows-equivalents-of-most-used.html
14•elsadek•3h ago•4 comments

Show HN: Zerobox – Sandbox any command with file, network, credential controls

https://github.com/afshinm/zerobox
108•afshinmeh•2d ago•84 comments

Windows 95 defenses against installers that overwrite a file with an older one

https://devblogs.microsoft.com/oldnewthing/20260324-00/?p=112159
116•michelangelo•3d ago•57 comments

Ask HN: Who wants to be hired? (April 2026)

57•whoishiring•10h ago•135 comments