3rd part of the series | Writing up our frontend (client) for our whitelist system
Shiawase • 2025-2-10 • 7 minutes
In this part of the guide, we will be setting up our script (front-end) for our whitelist system.
This does not need much of an introduction, it will also be relatively short compared to the previous section.
| Some executors may NOT support connections to local servers, so you may have to use a tunneling service like ngrok to expose your local server to the internet. (You may want to ask your executor’s development team for more information on this).
For the script, we will be relying on 1 main function, which is:
request
| Could be located under an exploit-specific global or the http
global table in your exploit.As for parsing the server response, we will stick to using the JSONDecode
method provided by the HttpService
service.
To get started, create a new script in your src/client
directory, we will call it client.luau
, then we can start writing the following:
We will declare the necessary variables and functions we will be using in our script.
-- The LPH_CRASH function is a macro provided by Luraph | You don't have to use it like me here.
local key = getgenv().whitelistKey or LPH_CRASH()
local HttpService = game:GetService("HttpService")
-- Feel free to add more functions as needed
local request = (http and http.request) or request or LPH_CRASH()
We will be making a POST request to the server’s whitelist endpoint, sending the key as the body of the request.
local response = request({
Url = "http://localhost:3000/whitelist",
Method = "POST", -- The POST method corresponds to the server's whitelist endpoint
Body = HttpService:JSONEncode({
whitelistkey = key
}),
Headers = {
["Content-Type"] = "application/json"
}
})
We will be parsing the response from the server, checking if the server is healthy (status code is 200), then parsing the body of the response.
if response.StatusCode == 200 then
local body = HttpService:JSONDecode(response.Body)
if body.valid then
print("Whitelisted")
else
print("Not whitelisted")
LPH_CRASH()
end
else
print("Server not responding")
LPH_CRASH()
end
Here is the final result of our script:
-- getgenv().whitelistKey = "myexamplekey"
local key = getgenv().whitelistKey or LPH_CRASH()
local HttpService = game:GetService("HttpService")
local request = (http and http.request) or request or LPH_CRASH()
local response = request({
Url = "http://localhost:3000/whitelist",
Method = "POST",
Body = HttpService:JSONEncode({
whitelistkey = key
}),
Headers = {
["Content-Type"] = "application/json"
}
})
if response.StatusCode == 200 then
local body = HttpService:JSONDecode(response.Body)
if body.valid then
print("Whitelisted")
else
print("Not whitelisted")
LPH_CRASH()
end
else
print("Server not responding")
LPH_CRASH()
end
Common mistake made by people is retreiving the HWID manually (usually via requesting an http bin) then sending the response value to the server for verification.
Why you shouldn’t do it:
LPH_CRASH
vs while true do end
LPH_CRASH
is a macro provided by Luraph, and is a much safer and more efficient way to exit the environment in case of an error or an unexpected response from the server.
To test our script, we will have to run our local server and then execute the script.
node index.js
After running the server, you can execute the script in your executor, and you should see the output in the Roblox console (F9).
With this, we have successfully set up our script for our whitelist system.
In the next part of the guide, we will be adding security measures to our system to prevent whitelist spoofing & attacks. You can check it out here