FlatChat+ was reported 2026/01/21 for Disallowed external code

The reporter said:

It appears to be loading arbitrary scripts from https://scripts.dounford.tech/ on line 526. I attached a screenshot of the relevant code

Felipe DounfordAuthor said:
This is indeed a feature, it has a command /load where you can load other scripts from the game, you can check the list with /scripts I'm a moderator in the game and also have a chat bot that handles the backend code of the /load This piece of code is only run on login if the person already loaded the script before with /load, when the person uses /load or if the person is using a very old version of the fmp dependency it would auto update it (some users were having problems updating it because dependencies are not auto updated by default on tampermonkey) This feature is well know in the community and I talk about it in almost every update of other scripts saying something like "Also available on FlatChat with /load"

This script has been updated since the report was filed.

This script has had 1 previous upheld or fixed report.

Felipe Dounford (the reported user) has made:

This report has been upheld by a moderator.

One of the core principles of Greasy Fork is that the user must be able to inspect the code in a script. External scripts can bypass this principle in a number of ways: they can change without warning or history, they can serve up different code to different people, and they can be used to hide malicious code in the middle of known libraries. Even if someone were to check an external script and determine it to be legitimate, that would be no guarantee that that script always has been or always will be legitimate. More info on external scripts: https://greasyfork.org/help/external-scripts