Alek Posted July 14, 2014 Posted July 14, 2014 Occasionally I make unannounced spot checks of local scripts to help ensure the security of OSBotters. Here are the results from the scripts reviewed (this does not mean they won't be dangerous after this is posted). Toda's Motherlode Miner: Clean Better Barrows: Low level threat, OSBot client was packaged in the script Jack's IP Checker: Clean, uses custom php file to retrieve your ip Pug Planker: Clean Ds Herb Calculator: Clean sSeagulls: Clean
before Posted July 14, 2014 Posted July 14, 2014 woah wait, can you more clearly explain what "Better Barrows" is doing with the Osbot client? Because if you can't actually read what info it's getting it can easily be getting our login details right? And if we don't keep our login details on with the client, can that script (if was malicious) still get our information? Thanks @Alek
Alek Posted July 14, 2014 Author Posted July 14, 2014 @before - That's why it's even considered, most of the time it's the result of new scripters including the client in their packaging.
Dashboard Posted July 14, 2014 Posted July 14, 2014 If you need any help with checking local scripts, I'd be ready to lend a hand. I check threads whenever they're posted for malicious code.