[WORKING AGAIN 2025] Instantly detect most executors that exist even before their executor's UI loads

Tested it with a local script in ReplicatedFirst, it’s also possible on mobile for the error to be “Argument 1 missing or nil” even without an executor/exploit open.

1 Like

This is because the first argument takes a LocalPlayer, and the function will set the first argument to Players.LocalPlayer by default but it does not exist during the execution of scripts inside ReplicatedFirst. I have fixed this issue by also checking for “Argument 1 missing or nil.”

Thanks!

2 Likes

Why would I want to get my account and all my alts banned for using an exploiter?

Dawg helping thats crazy lmao :sob: :pray:

1 Like

wrong, all executors are: be unsafe + detected

getscriptbytecode in pure luau yeah no

The project is now discontinued. Do you want the source code?

I remember talking about this to you in the Latte Softworks server, lol.

I love how trashy and insecure the new generation of roblox exploits are. Good post.

Hello! I am making an anti-cheat, and would love to be able to take a look at your Studio Executor, if you don’t mind.

Does that code run from the executors security? I mainly want to know because if executor functions such as game:HttpGet and loadstring can be exploited to run my own code with executor permissions and functions

The function name is longer then the wall of china lol

1 Like

i’d appreciate if you can give it to me :pray: thank you.

Sorry to interupt but if possible I’d like to get the source code.
I’ve been working on my own Studio lua-only executor (using a plugin) and only have 25% UNC (didn’t work too much on it yet) and recently found out how to get RobloxScript permissions from one of your posts, thanks for that! But now I see you worked on it too and I’d like to continue yours if you don’t mind. Already thanks for reading!

chat what does unc even mean :pray:

It’s a standard naming convention for exploit functions and variables so skids can copy paste easier

If I just replace the while loop, wont that just crash everyone? since it’s a server, but apparently Arceus X is a virus, so i’m not going to test it. (also it has a timeout)

NVM, i found out it was a localscript

sorry, but you’re bypassed with

local OldPromptPurchase
OldPromptPurchase = hookfunction(game:GetService('MarketplaceService').PromptPurchase,function(...)
				print('bypassed pp')
				return nil,error('Argument 1 missing or nil.')
end)

:slight_smile:

This wouldn’t work because the executor runs the protection functions before it runs any code, even if it’s in auto-execute, so the hookfunction wouldn’t fire in time leading to it still being detected

Bro, do you know that it is “Argument 2 missing or nil” and not “Argument 1 missing or nil.”? and I would recommend using the “OldPromptPurchase” that you keep at least :sweat_smile: