Skip to content
This repository was archived by the owner on Dec 9, 2025. It is now read-only.

Commit 4f4a87b

Browse files
committed
Re-ordering of some options.
1 parent dc67c73 commit 4f4a87b

2 files changed

Lines changed: 14 additions & 11 deletions

File tree

App/containers/OptionsContainer.js

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -37,15 +37,18 @@ const Options = ({dispatch, options}) =>
3737
checked={options.compact}
3838
onChange={() => dispatch(actions.toggleOption(types.TOGGLE_COMPACT_CODE)) } />
3939

40+
<Form.Checkbox
41+
label='Mangle Variable Names'
42+
checked={options.mangle}
43+
onChange={() => dispatch(actions.toggleOption(types.TOGGLE_MANGLE)) } />
44+
45+
<Divider />
46+
4047
<Form.Checkbox
4148
label='Self Defending'
4249
checked={options.selfDefending}
4350
onChange={() => dispatch(actions.toggleOption(types.TOGGLE_SELF_DEFENDING)) } />
4451

45-
<Form.Checkbox
46-
label='Mangle Variable Names'
47-
checked={options.mangle}
48-
onChange={() => dispatch(actions.toggleOption(types.TOGGLE_MANGLE)) } />
4952
<Divider />
5053

5154
<Form.Checkbox

templates/index.html

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -81,17 +81,17 @@ <h3>Sounds great!</h3>
8181
</tr>
8282

8383
<tr>
84-
<td class="collapsing">Self Defending</td>
84+
<td class="collapsing">Mangle Variable Names</td>
8585
<td>
86-
<p>This option makes the output code resilient against formating and variable renaming. If one tries to use a JavaScript beautifier on the obfuscated code, the code won't work anymore, making it harder to understand and modify it.</p>
87-
<p><small>requires the <strong>Compact Code</strong> setting.</small></p>
86+
Mangles the variable names. (For instance, instead of having this random pattern <code>0x123456</code>, they become <code>a</code>, <code>b</code>, and so on.)
8887
</td>
8988
</tr>
9089

9190
<tr>
92-
<td class="collapsing">Mangle Variable Names</td>
91+
<td class="collapsing">Self Defending</td>
9392
<td>
94-
Mangles the variable names. (For instance, instead of having this random pattern <code>0x123456</code>, they become <code>a</code>, <code>b</code>, and so on.)
93+
<p>This option makes the output code resilient against formating and variable renaming. If one tries to use a JavaScript beautifier on the obfuscated code, the code won't work anymore, making it harder to understand and modify it.</p>
94+
<p><small>requires the <strong>Compact Code</strong> setting.</small></p>
9595
</td>
9696
</tr>
9797

@@ -136,8 +136,6 @@ <h3>Sounds great!</h3>
136136
This feature adds random blocks of dead code (i.e: code that won't be executed) to the obfuscated output, making it harder to be reverserd-engineered. See the docs on <a href="https://github.com/javascript-obfuscator/javascript-obfuscator#deadcodeinjection" target="_new">JavaScript's obfuscator GH page</a> for an example of how this feature works.
137137
</p>
138138

139-
<p><small>requires the <strong>String Array</strong> option.</small></p>
140-
141139
<table class="ui definition table">
142140
<tbody>
143141

@@ -151,6 +149,8 @@ <h3>Sounds great!</h3>
151149
</tbody>
152150
</table>
153151

152+
<p><small>requires the <strong>String Array</strong> option.</small></p>
153+
154154
</td>
155155
</tr>
156156

0 commit comments

Comments
 (0)