Try searching for these keywords using Ctrl + Shift + F:
“loadstring” - Runs code inside of a string
“require” - Gets a module from the web
“MarketplaceService” - self explanatory
“string.byte” - turns strings into byte form
“string.reverse” - reverses strings (useful for obfuscation)
“RunService” - can be used to check if the game is running in studio and disable shirt spam if in studio.
Send over any suspicious scripts so i can analyse them
That certainly is.
It’s using bytecode of ‘require’ to retrieve the function through getfenv.
Any honest script shouldn’t be trying to hide require calls.
This is a good example of why just searching for keywords might not work. When scripts can be obfuscated your only option might be to inspect every script in the game by hand. You can do this by pressing Ctrl-P and checking “script only” in the dropdown box. That will display every script in the game.
Before doing that, you should also go into studio settings with Alt-S and checking these “Explorer” options under Studio:
I’m going to analyse this plugin’s source to see if it does anything malicious.
Judging by the search results for “RunService”, however, i think the cause is a fake “Brick cutter” plugin.
I recommend reinstalling your plugins one at a time and searching those keywords again. If anything pops up after that plugin install, the plugin is fake and is the plugin inserting the script.
If you do find any bad plugins, please send me the link so I can analyse them