Privacy
Privacy summary for submitted PHP code and site usage.
This page explains the intended handling model for code submitted to the online obfuscator and the role of standard operational logging.
Submitted code
Code submitted through the obfuscation form is processed to generate output for the current request. If you later add analytics, storage, or logging around request bodies, this policy should be updated to reflect that operational reality.
Error logging
The application may write internal error details to server logs for debugging and operational safety. Sensitive production environments should keep those logs access-controlled.
Third-party services
This site should avoid unnecessary third-party scripts for an obfuscation workflow. If third-party analytics or external media are added later, they should be disclosed here.
Operational recommendation
If this site is deployed publicly, access logs, error logs, backups, and any analytics tooling should be reviewed to confirm they do not retain sensitive request content longer than intended.