You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have confirmed it to be the same prior to any changes made on your end (b1149 and b1139). Sorry for not mentioning that earlier. It is a general issue with NCP.
The client is speeding up/sending a very small burst of packets to simulate a player jumping. This would be a bypass of the MorePackets check than SurvivalFly, which was originally thought. I may rework the MorePackets check just because the false positives it produces and the protection is somewhat limited. I just need to take a further look at a good detection method and what exactly the client is doing.
Full output of /ncp version - pasted from NCP Log.
Server
git-Paper-600
MC: 1.13.2detected: 1.13.2
NoCheatPlus
Plugin: 1.3-beta.4-CustomFork
MCAccess: 1.4.5-1.12.2|? / CB-Reflect
Hooks: AllViolations
NCP1.0Related Plugins
ProtocolLib v4.4.0 | ProtocolSupport v4.29-dev
Describe the issue
Step works going up one block increments in a teleport-like fashion, without generating any VL.
How to reproduce the issue
I've used Wurst (Both legit and simple), and have been told Sigma works as well.
Extra links/Videos (Including debug logs)
https://pastebin.com/Hcy3rkMT - Pretty much just spidering/teleporting up blocks
Any possible config options changed or plugins that may cause interference?
Default configuration.
The text was updated successfully, but these errors were encountered: