WeTest provides 15+ reinforcement items and is constantly expanding the reinforcement projects to provide more secure reinforcement capabilities for mini programs from different perspectives such as code virtualization and algorithm encryption to ensure the security of mini programs.
WeTest supports 5 levels of reinforcement. You can customize the reinforcement level according to business needs, shield files that do not require reinforcement, and flexibly select specific reinforcement methods for specific files.
Through virtualization, WeTest abstracts the code into assembly language and randomly customizes the mapping relationship to enhance security protection; at the same time, it uses Storage storage encryption, disables the code Console, etc. to make key codes more difficult to crack.
The WeTest mini program is reinforced to support common framework mini programs in various forms and different platforms, and supports mini programs developed by mpvue, uniapp, taro cross-platform frameworks, as well as H5 and public accounts.
WeTest supports users to perform one-click reinforcement directly on the SaaS platform page, local reinforcement policy configuration with command line tools, and privatized deployment of visual pages to meet customers' different levels of convenient operation and security needs.
After using WeTest to strengthen the product, the mini program volume expansion rate & page loading time are both small; there is almost no impact on application performance, and the platform compatibility is high.
Mini programs have a relatively low technical threshold. Despite efforts by major platforms to enhance their inherent security, some business security risks remain. This client found issues like ads, malicious viruses, and payment anomalies during security scans and penetration tests.
1. Before hardening, key logic and field names in the code were visible; after hardening, the original code was hidden and obfuscated; 2. Tools like wxappUnpacker/chrome devtool cannot analyze the reinforced code, and beautifiers like JS Beautifier cannot restore the reinforced code. 3. After hardening, the mini program's performance is almost unaffected, with a code bloat rate of only 23%.