u/Broad_Property4859

Hello, all. I'm developing a tool that serves as a better vulnerability tester. The vulnerability tester will not just check the validity of conventionally malicious functions (e.g. MarketplaceService:GetRobuxBalance(), MarketplaceService:PerformPurchase(), etc.), but will test these sorts of functions through different known methods of bypassing the executor's blocking system. The tester I have at the moment has already detected several vulnerabilities in very popular executors, but I am looking for more methods that the tool can go through to see if the executor is vulnerable, as I am only limited to 2 at the moment. This includes escaping the restricted sandbox that executors attempt to develop.

These methods can either be patched or unpatched in many modern executors, it doesn't matter, as these methods can still be possible within newer executors. If you'd like to contribute to the list of methods, then ONLY DM me, as other malicious actors may attempt to use these methods. These contributions will serve to be quite helpful in identifying potentially harmful vulnerabilities in executors, so I encourage everyone to help!

Stay safe out there!

reddit.com
u/Broad_Property4859 — 11 days ago