As the title states. Can hackers delete things from workspace?
like this:
for i,v in pairs(workspace:GetChildren()) do
v:Destroy()
end
As the title states. Can hackers delete things from workspace?
like this:
for i,v in pairs(workspace:GetChildren()) do
v:Destroy()
end
Yes, they can, but only they can see it themselves. It is not replicated to the server, so other players cannot see the changes.
Yes and no. If they find a backdoor, then they can do it serverside affecting all players. If you dont have any backdoors then it will only affect the hacker on their client.
Oh alright. I don’t have any backdoors so that shouldn’t be an issue. Thanks for the help, I was just curious!
Hackers cannot clear anything from the workspace, for other users.
If a hacker was to run that code, they would see everything delete on their screen, but due to a system called Filtering Enabled, this denies the clients view to be replicated to the server.
If the hacker had a backdoor in the game, then yes, they can access the server, but filtering enabled prevents hackers from destroying things on the server.
An example would be, the exploiter creates a part or deletes a part on their client. This won’t be replicated to the server, or else it would be game breaking.
Always follow the rule, never trust the client.
Ok,
there’s the Client (The players game)
and the Server (What Roblox sees, and everyone sees (kind of))
You can do stuff on the client, delete the whole workspace, it just affects that person, hence walking through walls, but the other people can’t walk through walls.
People say “replicating to the server”. All it means is that everyone sees it. The server is “everyones” view, but that can be manipulated on the client side. All it does is replicate to the client, which is the hacker.
“Hackers”/ Exploiters can only do this on the client side.
Exploiters can however clear things on their character that does get replicated to other players.
This includes, clothes, bodyparts and accessories.
Because the character has networkownership set to the exploiter’s client