Tas was reported 2026.02.08. for Obfuscated code

The reporter said:

Code is intentionally obfuscated.

ExabyteAuthor said:
This script is not intentionally obfuscated. The code structure comes from automated transpilation and compilation, not from deliberate attempts to hide logic. Specifically: Parts of the script are Babel / regenerator-runtime output, which rewrites modern JavaScript features (async/await, generators, classes) into ES5-compatible code. The WASM-related sections are wasm-bindgen generated glue code, which is automatically produced when compiling Rust to WebAssembly and integrating it into JavaScript. No manual obfuscation techniques are used (no control-flow flattening, string encryption, eval-based execution, or anti-analysis logic). Function and variable shortening is a byproduct of build tooling, not intentional obfuscation. The script does not attempt to hide malicious behavior, steal data, or evade review. All behavior is client-side and related to gameplay logic.

This script has been updated since the report was filed.

Exabyte (the reported user) has made:

This report has been upheld by a moderator.

please disable minification and use an external CDN for wasm, see our rules for scripts and external code