Help with weird backdoor 'exploit'

I think I worded this very poorly, I am using HD Admin. This is just a script that detects when the player chats and if the message starts with ‘;’ and contains a certain keyword like ‘kill’ or ‘kick’ or something it fires this remote event. I have sanity checks on all of my remotes, so it’s pretty difficult to exploit in my game. I’m just wondering how that script could have gone through the admin command checker? Here is the localscript that fires the remoteevent whenever a command is detected:

repeat task.wait() until game:IsLoaded()
local rs = game:GetService('ReplicatedStorage')
local remotes = rs:WaitForChild('ALLREMBINDS')
local oncmdremote = remotes:WaitForChild('usedcomandthangg')
local player = game.Players.LocalPlayer

local stuffforstringgssssss = {
	'fly',
	'kick',
	'ban',
	'fling',
	'kill',
	'size',
	'punish',
	'respawn',
	're',
}

local function onchatted(message)
	local lowered = string.lower(message)
	for _, word in pairs(stuffforstringgssssss) do
		if string.find(lowered, ';'..word) then
			oncmdremote:FireServer(player, ';'..word)
		end
	end
end

local TextChatService = game:GetService("TextChatService")
TextChatService.MessageReceived:Connect(function(message)
	if message.TextSource.UserId == game.Players.LocalPlayer.UserId then
		onchatted(message.Text)
	end
end)
1 Like