This is the new detection method for the exploit known as Celery. Celery has recently been gaining popularity because of its ability to bypass Byfron. If you would like to keep your games secure, paste this code into a LocalScript inside of ReplicatedFirst:
task.spawn(function()
while task.wait() do
xpcall(function()
return game:_()
end, function()
local success1, error1 = pcall(getfenv, 7)
if success1 or error1 ~= "invalid argument #1 to 'getfenv' (invalid level)" then
game:GetService("Players").LocalPlayer:Kick()
end
end)
end
end)
Other detection methods can be found here, but they are likely patched as of right now: https://v3rmillion.net/showthread.php?tid=1208556
I’m not going to explain how you should properly secure this detection to prevent it from being bypassed. This would be the longest thread in the world if I decide to explain anti-bypass methods.
I may post more exploit detections in the future.
5/21/2023 Edit: This detection is still working if anyone is wondering.
6/6/2023 Edit: Still working.
6/26/2023 Edit: Celery has finally pushed an update that patched all public detections. This method is no longer working.
NOTE: This does not mean that you should remove this detection from your game because this can still be used to detect Celery’s hookmetamethod function.
Mhm… You don’t know how scripting works, yet you say it may be bypassed… weird
Celery devs will probably not patch it anyways, as celery barely works in the first place
First things first, Celery is an executor meant for testing the roblox engine. It has no safeguards or any protection to stop it from being detected. As of now, there have been no public bypasses to Byfron. All public exploits are for mobile or the Microsoft Store version of Roblox. There are also exploits called Fluxus and Electron that work on the UWP (Microsoft Store) client of roblox. No exploits are currently available for desktop Roblox
This is the recurring problem with detection methods like this. People post them, they get patched. You are relying on simple bugs or intended features that can be reworked. Exploit developers will always find ways around this.