3.70 star(s) 3 Votes

VikingUnleashed

New Member
Apr 16, 2021
2
3
There's obfuscated nodejs code that is attempting to access location services and microphone when starting the game.

Sandboxed it. There's a plugin running chrome components that are collecting location and telemetry data, sending it to google's ad "services."

Recommend dev yank that cancer.
 
  • Like
Reactions: Arkus86 and bobbot

Rat-attack

Active Member
Aug 18, 2020
867
1,011
VikingUnleashed in case the Dev doesn't can we do anything to stop it?


Also incase anyone wanted it I used an decrypter to turn the image folder into viewable images so you don't need to play the game to see the art:
 
Last edited:

bobbot

Active Member
May 10, 2018
532
377
There's obfuscated nodejs code that is attempting to access location services and microphone when starting the game.

Sandboxed it. There's a plugin running chrome components that are collecting location and telemetry data, sending it to google's ad "services."

Recommend dev yank that cancer.
your comment got me trying to look dispite me really not knowing what i was doing, could someone doubble check me here? anyway, i remember that even if compiled programs often will have human readable bits still in the exe so took a chance and opened the games exe in notepad++ and ctrl f for google... something called protobuf wasnt far off from that search, took a look at the credits and something called libprotobuf-mutator was listed, surprise its google owned. claims its " libprotobuf-mutator is a library to randomly mutate protobuffers."... guess thats where the chromium came from.

edit, its got play services stuff on the credits page too
 
Last edited:
3.70 star(s) 3 Votes