--- /dev/null
+{
+ "author": {
+ "name": "Felix Geisendörfer",
+ "email": "felix@debuggable.com",
+ "url": "http://debuggable.com/"
+ },
+ "name": "active-x-obfuscator",
+ "description": "A module to (safely) obfuscate all occurrences of the string 'ActiveX' inside any JavaScript code.",
+ "version": "0.0.1",
+ "homepage": "https://github.com/felixge/node-active-x-obfuscator",
+ "repository": {
+ "type": "git",
+ "url": "git://github.com/felixge/node-active-x-obfuscator.git"
+ },
+ "main": "./index",
+ "scripts": {
+ "test": "node test.js"
+ },
+ "engines": {
+ "node": "*"
+ },
+ "dependencies": {
+ "zeparser": "0.0.5"
+ },
+ "devDependencies": {},
+ "optionalDependencies": {},
+ "readme": "# active-x-obfuscator\n\nA module to (safely) obfuscate all occurrences of the string 'ActiveX' inside\nany JavaScript code.\n\n## Why?\n\nSome corporate firewalls /proxies such as Blue Coat block JavaScript files to be\ndownloaded if they contain the word `'ActiveX'`. That of course is very annoying\nfor libraries such as [socket.io][] that need to use `ActiveXObject` for\nsupporting IE8 and older.\n\n## Install\n\n```\nnpm install active-x-obfuscator\n```\n\n## Usage\n\n```js\nvar activeXObfuscator = require('active-x-obfuscator');\nvar code = 'foo(new ActiveXObject());';\n\nvar obfuscated = activeXObfuscator(code);\n// -> foo(new window[(['Active'].concat('Object').join('X'))])\n```\n\n## License\n\nLicensed under the MIT license.\n\n[socket.io]: http://socket.io/\n",
+ "readmeFilename": "Readme.md",
+ "bugs": {
+ "url": "https://github.com/felixge/node-active-x-obfuscator/issues"
+ },
+ "_id": "active-x-obfuscator@0.0.1",
+ "_from": "active-x-obfuscator@0.0.1"
+}