--> src/main.rs:19:5
|
19 | #[hiarc_macro::hiarc_safer_rc_refcell]
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ the evaluated program panicked at 'hierarchical value indicates, that "F" is a higher level component (hierarchically) so it cannot be passed as parameter to a function in this component', src/main.rs:19:5
|
void CGameContext::SendEmoticon(int ClientID, int Emoticon, int TargetClientID) const
void CGameContext::SendEmoticon(int ClientID, int Emoticon, int TargetClientID) const
GameServer()->SendEmoticon(GetCID(), EMOTICON_GHOST, -1);
TL;DR: it's not exploiting any security vulnerabilities; it's telling your browser to go fetch each URL in a carefully-crafted list and load it in a tiny page element hidden slightly outside of the upper left corner of the window.
fetch("paypal.com/send/moni/reitw/420")
{:?}
dbg formatter to print struct fields/tp brainless tee
i get teleported to the upper left corner of the map ( 0 | 0 as coordinates )
/tp
. In the above command the parts of the name are parsed as numbers instead, which gives (0,0) because they are invalid. When a number is invalid, the command should show an error message to the user instead of teleporting them to (0,0).io_open
with IOFLAG_WRITE
due to a regression from #7254. Instead, the existing file contents were kept and the file pointer was set to the beginning of the file.
This caused broken demo files to be created (#7349) when recording a shorter demo with the same filename as an existing longer demo. It also caused the map tools to produce maps with additional junk data at the end, if an existing map is overridden by a smaller map....