Token validation
Payloads run only when a matching server-side token is active.
Security
inDark now generates protected files with a no-eval loader by default. The code still runs only after server-side token validation, but the generated package avoids the runtime pattern that most scanners and customers distrust.
.token file.require.Payloads run only when a matching server-side token is active.
Tokens can be constrained by expiry, IP address and domain.
Important actions are logged without writing the protected source into audit rows.
No loader can make distributed source code impossible to inspect. The goal is to raise the cost of copying, keep licensing under your control, and remove red flags that are unnecessary for normal use.
For sensitive secrets, use server-side APIs and environment variables instead of shipping the secret inside a protected file.