How is this even possible? lol. Seriously. If server hosts can access the basic computer information of their clients like this I wouldn't be surprised if there's some sort of exploit that allows hosts to execute arbitrary code on a client. Now I'm DEFINITELY staying away from this game.
This is how my anti-exploit detects Cheat Engine, which is in the client code which is placed in a player by the server when the player joins. R2D also uses this to detect CE. Unfortunately, this is bypassed easily by renaming the CE folder.
THIS WILL NOT WORK IF YOU USE IT YOURSELF. This is included in my Anti-Exploit.
plr=game.Players.LocalPlayer
img=script:WaitForChild("AntiCE"):WaitForChild("Frame"):WaitForChild("ImageLabel")
img.Parent.Parent.Parent=plr.PlayerGui
print("KAEClient loaded")
networking=game.ReplicatedStorage:WaitForChild("KAENetworking")
local stopce=logs.MessageOut:connect(function(msg, type)
if msg:match("Cheat Engine.exe: Failed to resolve texture format") then
print("CE detected! ALERT!")
type="Cheat Engine was detected on your computer."
networking.IAmABadMan:InvokeServer(type) --Tell the server that I am a cheater, and that I should be banished from existence.
end
end)
repeat wait() until stopce~=nil
local cever=5.0
for i=1, 20 do
if cever==6 then
print("rbxasset://../../../../../../../../Program Files (x86)/Cheat Engine 6.0/Cheat Engine.exe")
img.Image="rbxasset://../../../../../../../../Program Files (x86)/Cheat Engine 6.0/Cheat Engine.exe"
else
print("rbxasset://../../../../../../../../Program Files (x86)/Cheat Engine "..tostring(cever).."/Cheat Engine.exe")
img.Image="rbxasset://../../../../../../../../Program Files (x86)/Cheat Engine "..tostring(cever).."/Cheat Engine.exe"
end
cever=cever+0.1
repeat wait() until game:GetService("ContentProvider").RequestQueueSize==0
end
Basically it sets an ImageLabel element of a GUI to an executable file, and if it doesn't say "file not found" and instead says "Failed to resolve image format" then that means it found the file, but it's an exe, not a png. So yeah, you can go up a directory when you're using rbxasset:// to grab roblox assets from the local filesystem, which is normally locked to ROBLOX's content folder.
this is scary, but you can get things like actual images and models which are saved to file this way!
also, it isn't really bannable, it's just checking if a file exists on the computer, and if so, is it compatible? if so, load it. Sure, there may be a file containing sensetive, but I doubt that a file like that would be loadable into ROBLOX, anyway.