Tas was reported 8.2.2026 for Obfuscated code
The reporter said:
Code is intentionally obfuscated.
Exabyte said:
This script is not intentionally obfuscated. The code structure comes from automated transpilation and compilation, not from deliberate attempts to hide logic. Specifically: Parts of the script are Babel / regenerator-runtime output, which rewrites modern JavaScript features (async/await, generators, classes) into ES5-compatible code. The WASM-related sections are wasm-bindgen generated glue code, which is automatically produced when compiling Rust to WebAssembly and integrating it into JavaScript. No manual obfuscation techniques are used (no control-flow flattening, string encryption, eval-based execution, or anti-analysis logic). Function and variable shortening is a byproduct of build tooling, not intentional obfuscation. The script does not attempt to hide malicious behavior, steal data, or evade review. All behavior is client-side and related to gameplay logic.
This script has been updated since the report was filed.
Exabyte (the reported user) has made:
This report has been upheld by a moderator.
please disable minification and use an external CDN for wasm, see our rules for scripts and external code
