Roll20-cheat-dice 〈10000+ PRO〉
: GMs should hover their mouse over any suspicious roll in the chat window. This reveals the formula breakdown , showing the actual raw die roll and every modifier applied.
: A showcase repository illustrating how to hijack WebSocket objects to modify client-side dice results. roll20-cheat-dice
: While primarily used for automation, some scripts are designed to track and average player rolls to identify statistically improbable "hot streaks" that might indicate cheating. Detection and Mitigation for GMs : GMs should hover their mouse over any
: The primary technical method involves hijacking the window.WebSocket.prototype.send function. By using tools like Tampermonkey or Charles Proxy , users can intercept outgoing data packets. : While primarily used for automation, some scripts
: Encouraging players to use official character sheet buttons rather than custom macros makes it easier to verify that standard modifiers are being used.
Several community-developed projects on platforms like GitHub demonstrate these vulnerabilities for educational or illustrative purposes:
GMs can use built-in Roll20 features to verify the integrity of dice rolls and prevent common exploits: