Backdoor scanner
The backdoor scanner audits the resources actually running on your server. It runs off-path on a schedule, so it never blocks gameplay; findings land in the dashboard for operator review.
What it protects against
The realistic threat is a malicious resource: dropped via a compromised dependency, included as a copy of a paid resource from a leak, or shipped by a member of the team who shouldn't have commit access. The scanner doesn't try to perfectly classify every resource as good or bad — it surfaces ones that look statistically off, and lets the operator decide.
Modes
The scanner is alert-only today: it never disables or removes a resource. Verdicts land in the dashboard and (if configured) post to a Discord webhook. The mode column therefore describes how strongly an alert is surfaced, not what gets executed.
| Mode | Behavior |
|---|---|
observe | Findings are written to the audit log and the dashboard's Resource hygiene tab. No notifications. |
score | Same as observe, plus a Discord-webhook notification if a webhook is configured. Useful for operators who want to be paged on findings. |
enforce | Reserved. The scanner does not yet take automatic action against a resource — that will require explicit opt-in and a review queue. |
Verdicts
| Verdict | What it means |
|---|---|
cleared | Resource passed the scan. Either it's on the curated framework whitelist, or its content didn't match anything suspicious. |
high_risk | The scan surfaced a combination of signals strong enough to warrant operator review. Action stays manual — we don't auto-disable resources. |
whitelisted | Operator (or hoaxeye) marked this resource trusted. Whitelist entries are visible in the audit log with the reason. |
Cadence & scope
Operator recommendation
- All server types: leave the scanner running on the default cadence. Subscribe its Discord webhook to a private operator channel — not a public channel — so findings are visible to the team without leaking which signals fired.
- Custom-resource-heavy stacks: on the first run, expect to whitelist a handful of internal resources. Use the audit-log entries as your changelog — they tell future you why a given resource was trusted.
- See Server setup for the whitelist workflow in the dashboard.