If you are not using the
.ROBLOSECURITYcookie for your own custom use cases, you may ignore this announcement.
Hi Creators,
As we continuously improve the security of the Roblox platform, we will make some breaking format changes to the .ROBLOSECURITY cookie on or after 1 May 2026.
You may be using this cookie in development workflows or as part of live experiences, and we hope that this notice will allow sufficient time to mitigate potential impacts of these changes.
As a recap of cookie behavior:
- Clients can attach a
.ROBLOSECURITYcookie to authenticate their current request - Roblox will return a 401 response if the cookie is no longer valid for any reason
- In some cases, Roblox will indicate to a client via the standard
Set-Cookieresponse header that it should update its stored value of the.ROBLOSECURITYcookie for that cookie to remain valid on subsequent requests
If your use case already respects cookie updates sent by Roblox (via the Set-Cookie response header):
- This enforcement change should have no impact. All new
.ROBLOSECURITYcookies issued by Roblox have incorporated these format changes for several months now
For use cases with an older, hard-coded cookie, and which do not respect cookie updates sent by Roblox:
- This enforcement change may invalidate their
.ROBLOSECURITYcookies, depending on how old any particular cookie is. Clients should upgrade to a recently-minted cookie and respectSet-Cookieresponse headers to avoid additional breakage going forward (more details below)
As a reminder, Roblox recommends using Open Cloud APIs for your production applications whenever possible, as Open Cloud authentication methods and API contracts provide stability guarantees for third-party use cases and use scoped, secure credentials rather than account-level cookies.
How do I know if I’m using an outdated cookie?
As of this post, outdated .ROBLOSECURITY cookies will have one of two formats:
<Cookie Warning><Hex String><Cookie Warning>GgIQAQ.<Hex String>
Where <Cookie Warning> is the following string:
_|WARNING:-DO-NOT-SHARE-THIS.--Sharing-this-will-allow-someone-to-log-in-as-you-and-to-steal-your-ROBUX-and-items.|_
And <Hex String> is a long string consisting only of hex characters (0–9 and A–F).
You can also test your cookie against the following regular expression:
^(_\|WARNING:-DO-NOT-SHARE-THIS\.--Sharing-this-will-allow-someone-to-log-in-as-you-and-to-steal-your-ROBUX-and-items\.\|_)(GgIQAQ\.)?([0-9A-F]+)$
There may be additional outdated cookie formats in the future, and cookie formats may be deprecated without specific notice, so you are strongly urged to accept cookie updates that Roblox sends you using the Set-Cookie header (instructions below).
How can I receive auth cookie updates going forward and future-proof my workflows?
When your .ROBLOSECURITY cookie is eligible for an update, Roblox will respond to your API request normally but may include a standard HTTP response header with the header key Set-Cookie.
This header is sent back on a varying cadence of hours to days (and not on every request), but you will always have a few months to process the header before Roblox begins to reject your outdated auth cookie.
How you access this header depends on the programming language and HTTP client you’re using, but HTTP response headers are typically included in a key-value data structure returned by your HTTP client library. This data structure maps a single header key to one or more header values corresponding to that key.
For auth cookie updates, one of the values corresponding to the Set-Cookie key will look like:
.ROBLOSECURITY=<Cookie Value>; <List of Semicolon-Separated Attributes>
You can find more detailed information on cookie attributes here, but the behavior of your client should be to replace your stored cookie value with the new one in the Set-Cookie header (along with its attributes).
If you find that some of your use cases still require cookies, we’d love to hear your feedback.
Please let us know if you have any questions!


