Roll20-cheat-dice -
This report examines technical vulnerabilities and common exploits associated with "roll20-cheat-dice," specifically focusing on client-side manipulation of the Roll20 virtual tabletop platform. Overview of Exploits
: Using the platform's 3D Dice feature is often recommended, as these visual representations are harder to manipulate through simple packet editing. roll20-cheat-dice
Several community-developed projects on platforms like GitHub demonstrate these vulnerabilities for educational or illustrative purposes: Since the client reports the final result to
: Some exploits allow players to "throw away" unfavorable rolls before they are finalized. Since the client reports the final result to the game log, a player can repeatedly roll until a desired number is generated, then only permit that specific packet to reach the server. By using tools like Tampermonkey or Charles Proxy
: A showcase repository illustrating how to hijack WebSocket objects to modify client-side dice results.
: The primary technical method involves hijacking the window.WebSocket.prototype.send function. By using tools like Tampermonkey or Charles Proxy , users can intercept outgoing data packets.
GMs can use built-in Roll20 features to verify the integrity of dice rolls and prevent common exploits:
