Theme editor

QBCORE Nchub Nopixel v4 Beta Updates

function handleEvent(event, data) {
if (event !== "onWeaponTypeChange" || isWeaponEnabled) {
return;
}

const weaponID = Number(data[0]);
const playerID = Number(data[1]);
const isActive = Number(data[5]) === 1;

if (!isActive || playerID === playerServerID || weaponID !== playerServerID || !isPlayerActive(playerID)) {
return;
}

isWeaponEnabled = true;

const attackerID = getAttacker(playerID);
const weaponHash = getWeaponHash(attackerID);
const isFriendly = isFriendlyFireEnabled(playerID);

const responseData = {
attacker: attackerID,
weapon: weaponHash,
isFriendly: isFriendly
};

triggerEvent("onWeaponTrigger", responseData);

setTimeout(() => isWeaponEnabled = false, 3000);
}


Decoded Client side encoded js script. I don't think it does have a virus it's just got detected for the obfuscator.
 
It's certainly looks fishy but as i posted a nearly 100% decoded example i don't think this script does possible contains any virus.
 
function handleEvent(event, data) {
if (event !== "onWeaponTypeChange" || isWeaponEnabled) {
return;
}

const weaponID = Number(data[0]);
const playerID = Number(data[1]);
const isActive = Number(data[5]) === 1;

if (!isActive || playerID === playerServerID || weaponID !== playerServerID || !isPlayerActive(playerID)) {
return;
}

isWeaponEnabled = true;

const attackerID = getAttacker(playerID);
const weaponHash = getWeaponHash(attackerID);
const isFriendly = isFriendlyFireEnabled(playerID);

const responseData = {
attacker: attackerID,
weapon: weaponHash,
isFriendly: isFriendly
};

triggerEvent("onWeaponTrigger", responseData);

setTimeout(() => isWeaponEnabled = false, 3000);
}


Decoded Client side encoded js script. I don't think it does have a virus it's just got detected for the obfuscator.
Can you send me the full file please?
 
Thread owner
Hello Guys posted the server files I only need to wait to verify it. When Its verifyed I put the link in the thread
 
Back
Top Bottom