It’s only been less than a year ago I found that that repeat local a=true until a doesn’t infinite loop. I’ve been calling myself a Lua pro for at least two years, after using Lua for… 5 years now? Oh, as a sidenote: Maybe only send the debug info to people who can edit the place?Īt least, when I want to debug a game online, I would want to get the proper stacktrace stuff. (I mean: strip the names of locals, upvalues and the line number of instructions… not much left) I just wrote that I expect it to more or less print. Of course, in ROBLOX it might look completely different. (The location of those lines and the debug data: Chapter 4, the thingy on page 8) Those are stored at the beginning of the function, not part of the debug info: The ?: in function is because each function has a startline and endline. (Compile with -s to strip debug info, then run that compiled, then run original with debug info) C:\Folder>luac -s a (Definitly useful to know which script errored, but without all the other data… eh) In ROBLOX it could just stay the scriptname, nothing wrong with keeping that info. (also can’t minify globals, and user variables should be locals anyway)įootnote 3: The chunkname becomes ? when using luac s because they can. (could minify it, but if you setfenv with _index… it would be a pain) When doing print(a) you’re basicly doing print(getfenv()) internally. I tested it with ‘lua’ and ‘luac’ on windows though, see end of this post.įootnote 2: Accessing a global will always be traceable. Ths is all assuming there’ll even be a stacktrace, as there isn’t much left.įootnote 1: Going from “TestCode:5: Error” to “TestCode: Error” makes sense. Without (based on removing any information the debug information keeps): 15:27:23.332 - Error - read footnote 1ġ5:27:23.332 - Script '?' - global a - read footnote 2ġ5:27:23.333 - Script '?' - read footnote 3 What would they end up looking like? function a() I have some other information as well if anyone is interested about other destructive uses of these exploits, if anyone is interested. User inserts the file into Lighting to prevent crashing the client from loading all that content visibly instantly, then you just move it to workspace after, and they pretty much have the entire built place. The content is then sent as a roblox model file (rbxm?) to the user via some means i don’t know about. This does copy scripts aswell (however it’s just copying the scripts name, there’s nothing in the code since it’s a property copy.). The user will be given a series of lua scripts that will call upon other scripts and functions on the creators server, and apply it to the roblox client, and give whatever outcome to the user.Īll the users who have these exploits are often whitelisted via their username/userid, so that you can’t give other people the exploit tools without them paying, the whitelist is handled by the owner, this also prevents many exploiters from using alts, unless they pay again or request it be transfered to another account.įrom what i’ve been able to gather, places are often stolen by transfering ALL objects in workspace through an API (maybe trello?) which gets all of parts property information, and then duplicated the information to the exploit creators server, which information can be used to re-compile the place exactly the same as the other. The people who develop these exploits usually don’t include them in their client application, most of the base code is handled by the creators server/website, which runs the programs, injections or whatever so that the users won’t be able to know what it is, this is an attempt to keep roblox from learning how it works. Exploits that steal places are often refered to as “Level 7 or higher”.Ī lot of these exploits are distributed on Vermillion, a closed forum well known for targetting ROBLOX with exploits, hacks, tricks and otherwise unruly money-for-content exchanges. Have some history with people who frequently learn how to use exploits, i’ll jot down everything I know here.įirstly, alot of these exploits are distributed through purchase and authentication, users will spend dozens of dollars for different levels of exploits that go from giving you walkspeed to accessing workspace.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |