paint-brush
Protecting Your NativeScript Source Code with Jscramblerby@Jscrambler
644 reads
644 reads

Protecting Your NativeScript Source Code with Jscrambler

by JscramblerAugust 18th, 2017
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

<strong>We’re happy to announce that </strong><a href="https://www.progress.com/?utm_source=jscrambler.com&amp;utm_medium=referral" target="_blank"><strong>Progress</strong></a><strong> </strong><a href="https://www.telerik.com/?utm_source=jscrambler.com&amp;utm_medium=referral" target="_blank"><strong>Telerik</strong></a><strong> has recommended </strong><a href="https://jscrambler.com/?utm_source=medium.com&amp;utm_medium=referral" target="_blank"><strong>Jscrambler </strong></a><strong>as the solution of choice to protect </strong><a href="https://www.nativescript.org/?utm_source=jscrambler.com&amp;utm_medium=referral" target="_blank"><strong>NativeScript</strong></a><strong> Applications.</strong>
featured image - Protecting Your NativeScript Source Code with Jscrambler
Jscrambler HackerNoon profile picture

We’re happy to announce that Progress Telerik has recommended Jscrambler as the solution of choice to protect NativeScript Applications.

Read more about their announcement below.

“In this article, we’ll look at why you might want to use Jscrambler, how it works, and how you can integrate the tool into your own NativeScript apps. Let’s start by looking at the why Jscrambler might be a good fit for your applications.

Why Jscrambler?

In NativeScript you write your application logic in JavaScript. And because JavaScript is not a compiled language, your NativeScript application’s source code gets distributed in plain text as part of your Android and iOS application packages. If you dig into the platforms folder, you’ll find the plain text source code that ships with your NativeScript apps—code that malicious users have the potential to find as well.


An example of the plain text code that gets distributed with your NativeScript applications by default. This specific code is from a built version of the NativeScript Groceries sample.

If you come from a web development background this plain text deployment is not a new concept — web apps absolutely must ship their source code in plain text for browsers to interpret. But if you come from a native development background this is a new problem, as native apps typically only distribute compiled byte code.

If you’re concerned about protecting your NativeScript app’s source code you have a few options. NativeScript has built-in support for UglifyJS, a tool that compresses JavaScript code. During the minification process, Uglify replaces variable names and removes whitespace, making your code far harder for your average developer to read. For example, here’s what the code for the Groceries sample looks like after it goes through UglifyJS.

The source code of the NativeScript Groceries sample after going through UglifyJS.

However, UglifyJS’s sole purpose is to reduce the file size of your code, and not to obfuscate your code so that’s it’s difficult for malicious users to reverse engineer. For instance, if I take the same minified code from above and run it through an online formatting tool, suddenly that code becomes far more readable.

The uglified source code of the NativeScript Groceries sample formatted using jsbeautifier.org.

The UglifyJS minification might be sufficient if you just want to do some really basic code hiding as part of your NativeScript app deployments, but if you really want to protect your code you need a tool dedicated to obfuscation — and that’s where Jscrambler comes in.

How Jscrambler works

At a high-level, Jscrambler takes your JavaScript code, and mangles it beyond recognition while ensuring that the code continues to work as expected. Just to give you an idea of what that looks like, here’s what the same NativeScript Groceries sample code looks like after it goes through Jscrambler.

The source code of the NativeScript Groceries sample after going through Jscrambler.

Good luck figuring out what’s going on there. And even if you run this code through a beautifier or formatting tool, you’ll still have a heck of a time deciphering anything. Here’s what that same file looks like after going through jsbeautifier.org.

The Jscrambler-processed source code of the NativeScript Groceries sample formatted using jsbeautifier.org.

As the above screenshot above shows, Jscrambler goes above and beyond scrambling your code so that it’s unreadable even after going through formatting and beautifier tools. Malicious users will have a heck of a time trying to understand what that code is doing.

Jscrambler offers a number of configurable transformations so you can fine tune exactly how the tool transforms your code, but the Jscrambler team has provided us with a series of default settings for NativeScript developers. Let’s take a look at these settings and see how you can get Jscrambler working in your apps.

Getting Jscrambler working

The first thing to note is Jscrambler is a premium tool, however, they do offer free trials for anyone that wants to give Jscrambler a shot. To follow the steps in this article you’ll need to sign up for one of those trials on the bottom of https://jscrambler.com/using this form.

After you create your trial account, head to your dashboard and click the big green “Create App” button.

Give the app a name and click the green “Create App” button again.

At this next screen you’ll want to note your application’s id (see red arrow in the image below), as you’ll need it in a moment.

Now that you have the necessary Jscrambler account work done, let’s shift over to your NativeScript app to see how to tie into the Jscrambler service.

Installing the Jscrambler plugin

Jscrambler’s NativeScript integration is done through a webpack plugin. So if you haven’t already, go ahead and install the NativeScript webpack plugin in your app. If all goes well, the installation should be as easy as running the following two commands.

npm install --save-dev nativescript-dev-webpack

And then:

npm install

NOTE: If you run into issues setting up webpack in your NativeScript app, the NativeScript community forum is a great place to ask for help.

Once you have webpack installed, you’ll next want to install the Jscrambler webpack plugin.

npm i --save-dev jscrambler-webpack-plugin

After that, create a new file in the root of your app named jscrambler.json, and paste in the following code.

{  "keys": {    "accessKey": "YOUR ACCESS KEY HERE",    "secretKey": "YOUR SECRET KEY HERE"  },  "applicationId": "YOUR APPLICATION ID HERE",  "params": [    { "name": "whitespaceRemoval" },    {      "options": {        "mode": "SAFEST"      },      "name": "identifiersRenaming"    },    { "name": "dotToBracketNotation" },    { "name": "stringConcealing" },    { "name": "duplicateLiteralsRemoval" },    { "name": "functionReordering" },    { "name": "functionOutlining" },    { "name": "propertyKeysObfuscation" },    { "name": "propertyKeysReordering" }  ],  "areSubscribersOrdered": true,  "applicationTypes": {    "webBrowserApp": false,    "desktopApp": false,    "serverApp": false,    "hybridMobileApp": false,    "javascriptNativeApp": false,    "html5GameApp": false  },  "languageSpecifications": {    "es5": true,    "es6": false,    "es7": false  },  "useRecommendedOrder": false,  "sourceMaps": false}

NOTE: This file contains the recommended settings for using Jscrambler in NativeScript apps. Feel free to check out the Jscrambler docs for more details on what each of these settings do.

You’ll need to fill in the three placeholder values—YOUR ACCESS KEY HERE, YOUR SECRET KEY HERE, and YOUR APPLICATION ID HERE—with your own values. The APPLICATION ID is the value we noted earlier when you created an app in the Jscrambler interface.

Once you have your application id entered, head to the “My Account” section on the Jscrambler site, and scroll down to find both your Access Key and your Secret Key, which you’ll want to copy and paste into your jscrambler.json file.

With your configuration in place, your last step is to add Jscrambler’s webpack plugin in your webpack configuration. To do that, open your webpack.config.js file in the root of your app.

In this file, start by copying and pasting these two lines of code at the top, which imports the plugin itself and makes it available to use.

const JscramblerWebpack = require("jscrambler-webpack-plugin");  const jscramblerConfig = require("./jscrambler.json");

Next, scroll down in the same webpack.config.js file until you find the getPlugins() function. To activate the Jscrambler plugin you need to add the following entry to that function’s plugins array. (I’ve been adding mine just after the new BundleAnalyzerPlugin({}) entry.)

new JscramblerWebpack(Object.assign({}, jscramblerConfig, {      chunks: ["bundle", "vendor"]})),

And with that, you should be all set to test this Jscramber in your app.

Scrambling your code

To run your app through Jscrambler, all you have to do is run one of the npm scripts that build NativeScript apps with webpack enabled. The easiest to use are the start-ios-bundle and start-android-bundle scripts, which build your app with webpack and start them on either an iOS or Android device.

npm run start-ios-bundle

or

npm run start-android-bundle

After the build process completes, you’ll have to look through the platforms folder to see the result of the obfuscation. If you built for iOS, open your platforms/ios/NAME_OF_YOUR_APP_/app folder, and if you built for Android, open your platforms/android/src/main/assets/app folder. Open those folders’ bundle.js and vendor.js files and you should find heavily scrambled code that looks something like this.

Malicious users will now have a extremely difficult time figuring out what this code does, and your app should continue to work exactly as expected. (Let us know if it doesn’t — we’ve tested about a dozen apps and haven’t hit a single problem.)

Furthermore, in our testing we haven’t detected any meaningful performance regressions from scrambling NativeScript application code. Your experiences may very, so it’s definitely worth testing your app heavily once you enable Jscrambler, but in our experimenting enabling Jscrambler is a fairly seamless process.

Wrapping up

Jscrambler is a powerful tool for protecting your JavaScript code from malicious users. The Jscrambler webpack plugin fits nicely into NativeScript webpack workflow, making it a convenient option for NativeScript developers looking to protect their source code. So try going through this article’s steps in your own apps and see how it goes.”

Originally published on NativeScript Blog on August 17, 2017.