I did this too but I wasn’t sure if it would work so I looked it up and found out that exploiters can see what you send so they can just see the password and place it :c
(I hate how exploiters just make our lives impossible)
they can if its a local script I think. But I’m not talking about reading the scripts, I meant like they can see the data being sent when you fire a remote event so then they can see the password you sent and just copy it
this isn’t true, exploiters can see remote events and functions sent and received by the client and can also decompile localscripts and modulescripts to a limited degree
That’s false, any code run on the client is running on the exploiters device and can be decompiled by the exploiter, server scripts on the server cannot be read as they are ran on Roblox, not on the player’s device. They can also read any events and messages sent from the server, to their client, to gain understanding on how you communicate with events. They can inject code that reads remote signals.
There are 3 things you could try to help make a event secure. Use UUIDs and give remotes new UUIDs every bit of time.
Send back the script instance from the client to the server, only if the server receives remotes from the desired script should you act upon it.
Use unix stamps to help validify the genuity and timings of the remotes.
But in the end, exploiters can even get around these if they care enough to do so, and they only require exploiters to take an extra step, but doesn’t cause any proper prevention. You just have to make sure the server checks and modifies things, not the client.
bro i have first hand experience developing anti cheats, do you seriously believe if it was that simple as making a password using 1 if statement, people wouldnt have done it already?
people tend to overcomplicate things out of ego, the most complicated issues in the world have simple solutions. Also, did you ever try making a remote event anti cheat or just anti fly and stuff?