Input

Detection Report

What Is the JavaScript Obfuscation Detector?

Ever received a JavaScript file you didn't write and weren't sure if it was safe? This tool scans it and flags common obfuscation signals: eval() calls, auto-generated identifiers, heavily escaped literals, and array indirection — all patterns used in malicious scripts. It gives a fast static report to help you prioritize manual review. For cleaning up obfuscated code, the Obfuscator.io docs explain common patterns. For broader analysis, Chrome DevTools and AST Explorer are handy complements.

Analysis runs in your browser and does not execute the code. For cleanup, use JavaScript Deobfuscator. For packed wrappers, use JavaScript Unpacker.

How to Use the Detector

1

Paste or Upload Script

Insert JavaScript in the input panel or upload a file.

2

Review Risk Report

The tool calculates a heuristic score and lists findings with evidence.

3

Investigate Next

Use the suggested next steps to decode, unpack, or manually inspect suspicious regions.

Example Report

Input

JavaScript

Output

Report

Related Tools