Recently, I was trying to implement a rather low-level type of anti-exploit system to my game (Yes, it's FE). It was until I actually finished the system that I realized that if an exploiter could somehow gain access to the game's explorer or something similar to it, and they could see where the game's files, models and scripts were placed that would render my anti-exploit system completely useless.
My questions are:
Can exploiters gain access to a game's explorer, or something similar to it? If so, then is there anyway to prevent this? Also, if it is possible to gain access to a FE game's explorer; would anyone know if it's a common type of exploit? Should this even be something to worry about?
Yes, there is Dex, Dex v2 and a Dex v3 coming up so I've heard. There are tons and tons of explorers for exploiters.
It's commonly used for finding remotes, and yes it works on FE.