Sensitive environment detection
This option binds the obfuscated code to its target runtime environment and uses advanced browser fingerprinting to detect automation tools. Code protected with this option will intentionally break when run in:
Headless browsers (headless Chrome/Chromium, PhantomJS)
Browser automation tools (Puppeteer, Playwright, Cypress, Selenium/ChromeDriver, Nightmare)
Node.js (when target is set to browser)
jsdom or similar server-side DOM emulations
Environments where native browser builtins have been hooked or replaced
The code will work correctly in regular browsers (Chrome, Firefox, Safari, Edge), including when loaded inside iframes, browser extensions (content scripts), and Web Workers. If you need to run automated tests against protected code, disable vmSelfDefending for test builds — this option is designed to prevent automated analysis and cannot be safely used with any automation framework.