I want to retract my previously stated opinion on this. It's true that tamper-proofing is a lot of work with minimal benefit to most end-users, and most libraries shouldn't worry about it. But, I do realize now that there are certainly valid use cases for writting this sort of code. For example, it would be really weird if monkey patching Array.prototype.map() suddenly caused node's http module to stop working. To prevent this, I understand that node writes all of their core modules in a tamper-proof way. Additioally, something like @ljharb's polyfills are intended to be as close to the spec as possible. It would, again, be weird if monkey patching Array.prototype.map cause another built-in method to start misbehaving because it was polyfilled in a way that wasn't tamper-resistent - the same reasons that node tamperproofs their code is the same reason @ljharb does so.
I've since learned of many other popular libraries who like to follow this practice. I do think it's a little overboard for most libraries to care enough about this issue to uglify their code to this extent, but hey, if that's what they want to do, so be it.