![]() |
Callstack Access
Making an item system, I have a function that looks like this:
PHP Code:
PHP Code:
However, if this is used, it works perfectly: PHP Code:
This is, of course, serverside. It would be great if this could be fixed ASAP, or if someone knows a solution. Thanks. |
I am probably missing something here, but why would you ever call functions outside of function blocks?
(Also I assume this is for debugging?) |
Quote:
PHP Code:
Quote:
Right now I'm simply denying anything I can't get the callstack for, and then only allowing it for a list of allowed scripts. However, I'd like it if I could see what function is trying to add an item so staff can tell if it was an honest glitch, or if someone is trying to abuse powers (Era has had a lot of abuse of power problems lately). |
Quote:
Chris, why not just eliminate the possibility of a weapon addition on a global scope (or, consequently, through the weapon itself) by only allowing calls that have a total stack size of >1? |
Quote:
|
Quote:
|
bump
|
| All times are GMT +2. The time now is 12:08 AM. |
Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2025, vBulletin Solutions Inc.
Copyright (C) 1998-2019 Toonslab All Rights Reserved.