logo

Database

Summary

The source code must be obfuscated in production environments.

Description

Implementing obfuscation techniques makes it challenging for attackers to reverse engineer the source code. By transforming the code structure and renaming variables, functions, and classes, the obfuscated code becomes harder to read, understand and more resistant to de-compilation.

Supported In

This requirement is verified in following services

Essential Plan

Yes

Advanced Plan

Yes