Seems malicious, I would not use it.
It is a virus, infact its actually an exploit script. game:HttpGet is a function that only exploit executors can use.
As other have already pointed out, DO NOT run that code. Especially any scripts from v3rmillion that lead to 3rd party websites/any obfuscated code. V3rmillion is already as sketchy as it is, that could do something harmful.
What’s wrong with being on the website developers are on the website.
I am almost 100% sure that is some sort of evil backdoor. Loadstring is sus enough but then the source of the code is obfuscated!?! Don’t put this in your game. Also what are you doing on v3rmillion isn’t that were most exploits are sourced?
IN CASE THIS WASN’T CLEAR ENOUGH DO NOT RUN THIS CODE PERIOD END OF DISCUSSION NO QUESTIONS ASKED!!!
Devs can also use it to patch exploits.
Re-read what I said please and thank you.
Most backdoors have the same type of code which starts with loadstring and then ends with the link. I would be careful with this or just not touch that download/link at all. Or put it into your game.
I would remove the code, as it looks very suspisious. It’s most likely a backdoor.
dude click the github link. The script is…it doesn’t even do anything. I mean like wut is with the random letters and numbers and all those swear words and phrases.
Edit: On second thought don’t click it
Yes. The code is a virus, and I would delete it immediately. The reason it’s so long is because it can corrupt your game and make it slow.
Below, I have a list of things that I see in a virus.
The only exception is require(), which I would make sure the module you are getting is verified. Some examples of good ones are HD admin, Topbar+, and Simply Admin. Please also make sure it is the real one.
require()
string.sub() — sometimes this is good, but please make sure you script it yourself and know what it is doing.
require() — make sure it is made by the legit creator by going to Roblox.com/library/Whatever number is in the brackets.
game:HttpGet() —Pretty sure this is deprecated, not sure.
:LoadAsset() — sometimes You want to add your model into the game. Viruses can also add themselves with this function. Same thing as require, use roblox.com/library/the number in brackets
Those are the most common ones I see. Any assistance, please reply. Thanks, WE
If you are not sure if a script is a virus, please feel free to PM me.
Mostly getfenv() it’s used to get functions and such, global info from a script, so you can do require using it, or print, or whatever, via a string, then they use those weird number based strings like “/213/1234/124/”
https://gist.githubusercontent.com/ComoEsteban/77ad09c3904437f2386c7dc9ae9b1046/raw/
The script is obfuscated I think
Yes. I searched through the github code. Down the bottom, a string “compares” it to synapse and other Lua Executors. Definitely a virus. Stay safe.
This is definitely a backdoor, Make sure you remove the script and try to scan all the scripts in your game manually to find others that are possibly there.
That is DEFINITELY a backdoor. Http hooking just for anti-core gui scripts? Smh.
I never used the script in the first place… Thats why I asked before I used it.
Thanks, Yeah I had a lot of red flags starting off that it was on v3rmillion and it was obfuscated as well the user being a known exploiter and is inactive.
Thanks, but you forgot
loadstring
Games by default have Loadstring disabled as it would pretty much disable all anti-exploits and give hackers serverside to your game.
as it would pretty much disable all anti-exploits and give hackers serverside to your game.
This is false. Exploiters need a backdoor in the game in order to be able to gain server-side access, most backdoors use a Lua VM anyway so the option does nothing