Hi would this work to prevent exploiters from firing the remote event?
local debounce = false
game.ReplicatedStorage.ClothingChange.OnServerEvent:Connect(function(player, value)
if not debounce and player ~= nil then
debounce = true
delay(5, function() debounce = false end)
if value ~= nil then
print('not nil!')
end
debounce = false
end
end)
correct im trying to make it where the script checks the attribute (password) and then fires the event with the attribute, the server then checks to make sure that the attribute is the correct argument and if its not it ignores
Exploiters can just grab the attribute. Focus on securing the server first.
If you want to add a “password” so badly, at least make it dynamically generated/decoded, so that they can’t recreate it in a straightforward way.