Tas is op 08-02-2026 gemeld omwille van Verdoezelde code

De melder zei:

Code is intentionally obfuscated.

ExabyteMaker zei:
This script is not intentionally obfuscated. The code structure comes from automated transpilation and compilation, not from deliberate attempts to hide logic. Specifically: Parts of the script are Babel / regenerator-runtime output, which rewrites modern JavaScript features (async/await, generators, classes) into ES5-compatible code. The WASM-related sections are wasm-bindgen generated glue code, which is automatically produced when compiling Rust to WebAssembly and integrating it into JavaScript. No manual obfuscation techniques are used (no control-flow flattening, string encryption, eval-based execution, or anti-analysis logic). Function and variable shortening is a byproduct of build tooling, not intentional obfuscation. The script does not attempt to hide malicious behavior, steal data, or evade review. All behavior is client-side and related to gameplay logic.

Dit script is bijgewerkt na het opstellen van de melding.

Exabyte (de gebruiker waarvan melding is gemaakt) heeft het volgende gedaan:

Deze melding is gehandhaafd door een moderator.

please disable minification and use an external CDN for wasm, see our rules for scripts and external code