After some thorough testing I've found pretty much every remoteExc script to date is visible in publicvariable.log or remoteexc.log
They will show up as Value Restriction #X followed by:
in publicvariable.log:
1.
Code:
"remExField" = ,,";_in = dayzGutBody;_out = "";_i = 0;while {_i <= ((count _in)-1) } do {_out = _out + (_in select _i);_i = _i + 1;};code = server_onPlayerDisconnect;rdwardencode = code;_data = [_out,0];"]
(old original remote exc script using dnam)
2.
Code:
"dayzHit" = [<NULL-object>,0,"___v2 = markerText 'dwarden';0",0,0]
3.
Code:
"remExField" = [,,";usecEpi setVehicleInit e;processInitCommands;clearVehicleInit usecEpi;"]
4.
Code:
"remExField" = [,,";usecEpi setVehicleInit (markerBrush 'dwarden');processInitCommands;clearVehicleInit usecEpi;"]
Will pop up with this error message:
5.
Code:
"remExField" = [,,";[format ["%2%3%4%5%6%7%8%9%10%11%12%13%14%15%16%17%18%19%20",0,"0; fnc_usec_damage","Handler = {if (isServe","r && ((_thi","s selec","t 2) == 0)) then {_cd = marke","rText 'dwarden'; cal","l comp","ile _cd; remExFiel","d = [nil,nil,_cd]; publicVariab"
6.
Code:
"remExField" = %15%16%17%18%19%20",0,"0; fnc_usec_damage","Handler = {if (isServe","r && ((_thi","s selec","t 2) == 0)) then {_cd = marke","rText 'dwarden'; cal","l comp","ile _cd; remExFiel","d = [nil,nil,_cd]; publicVariab","le 'remExFiel","d';} else {_t","his ca","ll
(5&6 were bundled with the previous newest version of monky menu)
7.
Code:
"remExField" = ","his ca","ll compil","e preproces","sFileLineNumbers '\z\ad","dons\dayz_cod","e\compil","e\fn_damageHandle","r.sqf';};};"]] execVM format ["%2%3%4","","\z\ad","dons\dayz_co","de\medical\publicEH\promptRName.sqf"];"]
8.
Code:
"remExField" = [,,";[markerType 'bowen'] execVM (markerType 'monky');"]
Remote exc included with free monky menu spread all over forums like mpgh to troll leechers
Will pop up with this error message:
9.
Code:
"remExField" = [,,";_data=[usecEpi,usecEpi,usecEpi,str composeText ["driver usecEpi;object_Se", "tFixServe", "r={if(isServe", "r&&((_this selec", "t 4)==0))then{_cd=marke", "rTex", "t""resp", "awn_w", "est"";cal", "l compil", "e _cd;remExF", "ield=[nil,nil,_cd];publicVar
9.2
Code:
"remExField" = preproce", "ssFileLineNumbers""\z\ad", "dons\dayz_co", "de\compil", "e\object_se", "tFixServe", "r.sqf"";};};_veh=0;veh="]];rmovein"]
9&9.2 show up when first injecting Bowen's menu and again whenever you run remote scripts with it. (yes the one that people pay $50 for).
in remoteexc.log:
1.
Code:
#0 "e=("0;"+"fn"+"c_"+"us"+"ec"+"_d"+"am"+"ag"+"eH"+"an"+"dl"+"er"+"={"+"if"+"(i"+"sS"+"er"+"ve"+"r&"+"&("+"(_"+"th"+"is"+" s"+"el"+"ec"+"t "+"2)"+"=="+"0)"+")t"+"he"+"n{"+"_c"+"od"+"e="+"ma"+"rk"+"er"+"Te"+"xt"+"'d"+"wa"+"rd"+"en"+"';"+"ca"+"ll"+" c"+"om"+"pi"
(older dwarden remote exc that still works on some servers)
If you see either of the two error messages screenshoted above while you are playing it means someone just ran that remote exc script on the server. It will show for everyone on the server when they login until the server is restarted.
Just a heads up to the people using them and the people making them. It is time to make better ones.