Quote:
Originally Posted by Fatel
try this.
PHP Code:
//#CLIENTSIDE function onPlayerChats() { if (player.chat == "/iw System_Staffboots") { serverwarp(servername); } }
|
The reason why myself or Starfire_2001 haven't been specific is that if potential culprits see it publicly they'll know to alter the command rather than keep using the default one.
Regardless this solution would only detect that specific weapon name which can also be avoided easily, it's better to check player.chat.starts("/iw") (and preferably within the ChatBar.onAction event).
It's also a good idea to trigger the name of what they're trying to inject to serverside and log it, any common occurrences (such as the one you mentioned, and actually got caught trying on Classic using a guest account) can then be checked for existing.