Conversation
|
This won't fix the issue, the issue is the SKIN data is decoded to "{textures:{SKIN:{url:"http://textures.minecraft.net/texture/1ff33de8876e3cdd89ae81835f3affc946bc498393c3644cfa04b6a6c89d2fd"}}}" There is missing quotes causing json not to read it and i'm yet to find a decent way / library to handle this. |
|
This will be work? |
|
That would make it fail to prevent the exploit. |
|
but this work. |
|
This still doesn't check for valid json (which is the issue I see), well valid mojangson. And also does this run into issues with ProtocolLib not decoding the NBT properly still? (It was an issue I faced which is why I don't support 1.10) |
|
Why you need to check json? I think cheathers can't make "url" or "skin" with null value. |
|
@Dimatert9 And not checking that could just allow people to spoof values to satisfy this plugin? |
#3