I have used proguard to perform obfuscation of classes and methods. Upon researching, I came across this tool which does class name deobfuscation from penetration tester's prospective.
https://github.com/HamiltonianCycle/ClassNameDeobfuscator
In the recommendation section, author suggests to remove below line from the source code:
-keepattributes SourceFile LineNumberTable
Now this will now allow an attacker to do a proper reverse engineer and thereby gaining all original class names of the java file.
Up to here, fair enough. However, implementing this solution creates one problem for me. My developers are managing exception handling in fabric like below:
If I implement this solution, then developers will not get exact file name in order to track and resolve errors. They will get obfuscated file names in the exception list and hence they will have lot of huddles in tracking down the exceptions and to resolve it.
Is there any other way around through which I can accomplish these both tasks?