Alek Posted July 14, 2014 Share Posted July 14, 2014 Occasionally I make unannounced spot checks of local scripts to help ensure the security of OSBotters. Here are the results from the scripts reviewed (this does not mean they won't be dangerous after this is posted). Toda's Motherlode Miner: Clean Better Barrows: Low level threat, OSBot client was packaged in the script Jack's IP Checker: Clean, uses custom php file to retrieve your ip Pug Planker: Clean Ds Herb Calculator: Clean sSeagulls: Clean Link to comment Share on other sites More sharing options...
before Posted July 14, 2014 Share Posted July 14, 2014 woah wait, can you more clearly explain what "Better Barrows" is doing with the Osbot client? Because if you can't actually read what info it's getting it can easily be getting our login details right? And if we don't keep our login details on with the client, can that script (if was malicious) still get our information? Thanks @Alek Link to comment Share on other sites More sharing options...
Alek Posted July 14, 2014 Author Share Posted July 14, 2014 @before - That's why it's even considered, most of the time it's the result of new scripters including the client in their packaging. Link to comment Share on other sites More sharing options...
Dashboard Posted July 14, 2014 Share Posted July 14, 2014 If you need any help with checking local scripts, I'd be ready to lend a hand. I check threads whenever they're posted for malicious code. Link to comment Share on other sites More sharing options...