VIOLENT Documentation
Complete guide to using the VIOLENT script protection and key management platform.
Getting Started
VIOLENT is a next-generation script protection, key system, and loader management platform. It allows developers to securely distribute, license, and monitor their Roblox Luau scripts.
What VIOLENT Does
- Script Protection — Upload and protect your scripts with key-based authentication
- Key System — Generate, manage, and distribute license keys
- Loader System — Generate loader code that validates keys before delivering scripts
- Execution Tracking — Monitor every script execution with detailed logs
- Anti-Tampering — Prevent unauthorized access and detect manipulation attempts
Quick Start Guide
- Create an Account — Register at violentoffical.pages.dev
- Create a Script — Go to Dashboard → My Scripts → Create New Script
- Upload Your Code — Paste your Luau script content
- Generate Keys — Go to Keys → Generate Keys for your script
- Get Loader Code — Click on your script → Copy the loader code
- Distribute — Give the loader + key to your users
/panel command.
Core Concepts
Projects & Scripts
Each user can create multiple scripts. Each script has a unique ID, loader code, key system, and execution tracking. Scripts are stored securely on VIOLENT's infrastructure and only delivered to authenticated users.
Keys & Licensing
Keys follow the format VIOLENT-XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX. Each key can be configured with:
- Expiration date (time-limited access)
- Usage limits (max number of executions)
- Active/inactive toggle
Loader Flow
When a user runs the loader script:
- The executor sends an HTTP GET to VIOLENT's loader endpoint
- VIOLloader validates the license key
- If valid: script content is securely delivered and executed
- If invalid: an error message is shown
- Every execution is logged for audit purpose
Scripts
Scripts are the core resource on VIOLENT. Each script entry stores your Luau code and makes it available through the loader system.
Creating a Script
- Navigate to Dashboard → My Scripts
- Click Create New Script
- Enter a name, optional description, and paste your script code
- Toggle "Require key" if you want key-based access control
- Click Create Script
Script Properties
Property Description nameDisplay name for the script scriptIdUnique identifier (UUID format) versionScript version string totalKeysNumber of keys generated for this script totalExecutionsTotal number of successful executions isActiveWhether the script is currently enabled Loader System
The loader is how your users execute protected scripts. VIOLENT generates a one-line Luau loader for each script.
unique loader for each script automatically.How to Get Your Loader Code
- Go to Dashboard → My Scripts
- Click on your script
- Copy the generated loader code
- Give the loader code + a valid key to your users
Note: Your loader code and keys are unique to your script. Never share your raw script code or internal endpoints publicly.Important: If someone opens the loader URL in a web browser, they will see a "Protected by VIOLENT" page instead of the script content.Script Protection
VIOLENT protects your scripts through multiple layers:
- Key Authentication — Scripts only delivered after key validation
- Device Locking — Keys bound to specific devices, prevents sharing
- Browser Detection — Loader redirects browsers to protection page
- Execution Logging — Every access attempt is recorded
- Expiration — Time-limited keys auto-expire
Key Management
Keys are the access tokens that allow users to execute your scripts.
Generating Keys
- Go to Dashboard → Keys
- Select a script from the dropdown
- Click Generate Keys
- Set count, expiration days, and usage limit
- Keys are generated in
VIOLENT-UUIDformat
Key States
State Description ActiveKey is valid and can be used for execution InactiveKey has been disabled by the owner ExpiredKey has passed its expiration date ExhaustedKey has reached its maximum usage count Key Expiration
Keys support time-based expiration. Set the expiration period when generating keys from the dashboard. The timer starts from the moment of key creation.
Tip: Expired keys are automatically rejected. Set expiration to 0 for permanent keys.Security Overview
VIOLENT implements multiple layers of security to protect your scripts and user data:
- Secure Authentication — Industry-standard password hashing and token-based sessions
- Browser Detection — Prevents script viewing in browsers
- Execution Logging — Full audit trail of all access
- Input Sanitization — All user input is validated and sanitizedierarchy
- Role-Based Access — Owner/Co-Owner/Admin/User h
Anti-Tampering
The VIOLENT web dashboard includes client-side anti-tampering measures:
- DevTools detection and blocking
- Right-click context menu disabled
- Keyboard shortcut interception (F12, Ctrl+Shift+I, etc.)
- Console method overrides
- DOM integrity monitoring
- iframe injection prevention (clickjacking guard)
- Mobile debugger detection (Eruda, VConsole)
- Window size anomaly detection
Note: Anti-tampering is a deterrent, not absolute protection. Server-side validation is the primary security layer.