Hello, i did my first anti-exploit script it works perfectly, i just meet with a exploiter of roblox and he patched my anti-exploit script with using metatables. I just started to learn metatables yesterday but i dont really know how to fix this. btw my anti-exploit is serverside.
local mt = getrawmetatable(game)
local oldmt = mt.index
make_writeable(mt)
mt.index = function(t,i)
if i == "Kick" then
return nil
end
return oldmt(t,i)
end```
This code doesn’t do anything. Even if it did, that’d mean you have a vulnerability where an exploiter can send arbitrary code to the server and have it run. Doesn’t seem like that’s the case. ServerScriptService scripts cannot be bypassed whatsoever.
FilteringEnabled is standard and can’t be toggled. The toggle itself only serves as a benchmark or note of sorts. If it’s off, then you know to fix your game then turn the property on. It also enables a warning on the website.
Think of it like this: games that didn’t have FE on before it was forced or program to have their games compatible with FE will see that this is off. That can then serve as a reminder to flip the switch then start working on compatibility.
Not at all. You can use metatables for object-oriented programming but they are two different concepts altogether. OOP is a paradigm, metatables extend tables with additional functionality (e.g. defining what happens when a lookup on a nil index occurs).
His Anti Exploit is broken.
For example, he does a server sided check on Humanoid.WalkSpeed, if you modify that on client, it won’t replicate to the server.