How does this code bypass Voiliax / Oxcool1's Script Builder sandbox?
Voiliax / Oxcool1's Script Builder contains a strong sandbox which keeps track of all scripts ran and allows them to be stopped by virtually anyone if they wish so by them simply using the command "g/nos/all nol/all".
Now, some people (including me) thought this was quite intrusive and annoying, so there has been a "breakout" written. For the sake of curiosity, I'd be thankful if some genius from this forum could explain how the following piece of code works.
1 | if game.PlaceId = = 178350907 then |
4 | local Environment = getfenv ( getmetatable (LoadLibrary "RbxUtility" .Create).__call) |
5 | local oxbox = getfenv () |
6 | setfenv ( 1 , setmetatable ( { } , { __index = Environment } )) |
7 | Environment.coroutine.yield() |
Thanks guys!