since solara injects pre-game join, I think they create solaraās VirtualInputManager for executor to work properly when the experience starts to load. do not trust me on that one, itās just my theory.
VirtualInputManager is a ROBLOX service that is not created automatically, as itās not integral to anything, nor probably not used by anything. To create it or even use it, you NEED to call game:GetService
game:GetService(āVirtualInputManagerā) will CREATE the service, thus the detection. If Solara was not attached, VirtualInputManager is never called, thus FindService will return false. So when itās created, FindService returns true.
Thatās why kids, you never use a service that doesnāt exist unless itās called from :GetService()
You either use CoreGui or another service, or even better, you donāt use a service, just create your own environment that normal scripts cannot access in any way.
Enviroments that most client-based exploits cannot access that i know is the ādatastoreā, Thatās why they have their own way of saving writefile(), makefolder(), etc.
If the executor is a server-side one thereās nothing you can do.
Clearly, solara is an internal executor. It injects inside a avatar module location which is filled with itās modulescript execution and such.
Solara can be easily detected with this info, but i canāt provide exact info of what itās named and called cause i do not have the best braincells.