So I'm making a game and I'm wondering if it's possible for an exploiter to exploit a module script that contains shop information like prices.
This is the current module script, I have a local script that does require the module but just to read it.
01 | local StoreItems = { |
02 |
03 | Clicks = { |
04 | [ 0 ] = { |
05 | Name = "Default" , |
06 | Price = 0 , |
07 | Clicks = 1 , |
08 | Image = "http://www.roblox.com/asset/?id=6685581620" |
09 | } , |
10 | [ 1 ] = { |
11 | Name = "Test1" , |
12 | Price = 10 , |
13 | Clicks = 2 , |
14 | Image = "http://www.roblox.com/asset/?id=6689477815" |
15 | } , |
And this is the local script.
001 | -- [ Variables ] -- |
002 |
003 | local RS = game:GetService( "RunService" ) |
004 | local replicatedStorage = game:GetService( "ReplicatedStorage" ) |
005 | local replicatedData = replicatedStorage:FindFirstChild( "replicatedData" ) |
006 |
007 | local modules = replicatedStorage:FindFirstChild( "Modules" ) |
008 | local storeData = require(modules:FindFirstChild( "StoreData" )) |
009 |
010 | local Sample = replicatedStorage:FindFirstChild( "Sample" ) |
011 | local Clicks = script.Parent.Background.Clicks.ClicksIcon |
012 | local Backpacks = script.Parent.Background.Backpacks.BackpacksIcon |
013 | local Ranks = script.Parent.Background.Ranks.RanksIcon |
014 | local layout = script.Parent.Background.Items.UIPageLayout |
015 | local player = game.Players.LocalPlayer |
If the script executor the exploiter is using has a script decompiler (for example, Krnl and Synapse), then yes, unless the ModuleScript is hidden in places like ServerStorage or ServerScriptService, then they can't.
Yes, exploiters can exploit the module script by requiring it and using what is in the module. They can also see what is in module scripts and local scripts.