Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Guidance on preventing patching attacks #192

Closed
mimi89999 opened this issue Nov 10, 2024 · 1 comment
Closed

Guidance on preventing patching attacks #192

mimi89999 opened this issue Nov 10, 2024 · 1 comment

Comments

@mimi89999
Copy link

Hello,

I looked at the quick start and it seems that it would be trivial for some automation software to simply intercept the request for loading the script and parch it to always return false.

This could theoretically be mitigated by checking the checksum of the BotD JS lib, but the code doing that could also get patched.

Are there any recommendations on how to prevent that sort of attack?

@Valve
Copy link
Contributor

Valve commented Feb 18, 2025

Anything that runs in the browser is unsafe. If you want guarantees about client-side execution, it needs to be coupled with a server-side backend component. Apologies for a very general answer, but it's just not possible to prevent what you've described entirely with this client-only architecture.

@Valve Valve closed this as completed Feb 18, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants