Can exploiters change the module script? (Last post for me in 2021)

I know that exploiters have access to local scripts and edit them. But can they also edit code in module scripts?

If they don’t have editing access, does that mean I can view their values locally in module script?

local module = {}


function module.Init(plr)
	local self = setmetatable({},module)
	self.Player = plr
	return self

function module:Run()

return module
  • Note: Local script code for requiring this module: require(game:GetService("ReplicatedStorage").Anti).Init(game.Players.LocalPlayer):Run()
1 Like

As far as I know they can get and disconnect any connections easily, so this would likely do nothing but waste your time

Maybe no, the same as you can’t view code of a modulescript in a script.

They can edit connections, spoof stuff, and get upvalues and constants but they cant fully edit the code.
They thing close to editing it is to removing the real script and instead running the fake and edited local script code inside their exploit. This can’t work with modules.

1 Like

They can edit anything on the client, but it doesn’t replicate to the server.

The only stuff that replicates from client → server is:

So this does not fall under the behavior, however if you are relying on any client-sided measures to stop exploiting, they are always very easily defeatable. You should never rely on security through obscurity and should always practice security by design measures instead.

Client-sided anti cheats are always useless and should be always avoided, you should instead use server-sided methods instead. Try to think of stopping exploiters as more of a firewall rather than a “ban the exploiters” thing.
The only acceptable usage of client-sided anticheats is where the behavior cannot be prevented with security by design measures are Aimbot, MapStealing, Autofarms etc.