<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Steam game vulnerability Archives - Shane the Gamer</title>
	<atom:link href="https://www.shanethegamer.com/tag/steam-game-vulnerability/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Gaming &#38; eSports News</description>
	<lastBuildDate>Mon, 26 Jan 2026 14:44:37 +0000</lastBuildDate>
	<language>en-NZ</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.shanethegamer.com/wp-content/uploads/2025/06/stg-play-final-cropped-black.png</url>
	<title>Steam game vulnerability Archives - Shane the Gamer</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>This Steam Game Allegedly Could Let Other Players Hack Your PC, And The Developer Has Now Responded</title>
		<link>https://www.shanethegamer.com/esports-news/steam-game-hack-vulnerability-screeps-fixed/</link>
					<comments>https://www.shanethegamer.com/esports-news/steam-game-hack-vulnerability-screeps-fixed/#respond</comments>
		
		<dc:creator><![CDATA[Dimas Ibnu]]></dc:creator>
		<pubDate>Mon, 26 Jan 2026 14:35:19 +0000</pubDate>
				<category><![CDATA[eSports News]]></category>
		<category><![CDATA[game developer response]]></category>
		<category><![CDATA[MMO security flaw]]></category>
		<category><![CDATA[PC hacking game]]></category>
		<category><![CDATA[Screeps]]></category>
		<category><![CDATA[Screeps exploit]]></category>
		<category><![CDATA[Steam client bug]]></category>
		<category><![CDATA[Steam game vulnerability]]></category>
		<category><![CDATA[Steam security issue]]></category>
		<guid isPermaLink="false">https://www.shanethegamer.com/?p=80280</guid>

					<description><![CDATA[<p>A Viral Claim Sends Shockwaves Through Steam A programming-focused MMO on Steam has found itself at the centre of a major security controversy after claims surfaced that simply playing the game could allow other players to gain remote access to your computer. The allegation went viral after Isaac King posted on X, formerly Twitter, claiming [&#8230;]</p>
<p>The post <a href="https://www.shanethegamer.com/esports-news/steam-game-hack-vulnerability-screeps-fixed/">This Steam Game Allegedly Could Let Other Players Hack Your PC, And The Developer Has Now Responded</a> appeared first on <a href="https://www.shanethegamer.com">Shane the Gamer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<span class="cb-itemprop" itemprop="reviewBody"><h3 data-start="261" data-end="309">A Viral Claim Sends Shockwaves Through Steam</h3>
<p data-start="311" data-end="525">A programming-focused MMO on Steam has found itself at the centre of a major security controversy after claims surfaced that simply playing the game could allow other players to gain remote access to your computer.</p>
<p data-start="527" data-end="933">The allegation went viral after <strong data-start="584" data-end="625"><span class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"><span class="whitespace-normal">Isaac King</span></span></strong> posted on X, formerly Twitter, claiming that an MMO with more than 100,000 purchases contained a vulnerability that could let other players execute code on your machine. According to King, the issue had been reported previously, Steam had been notified, and the developer was allegedly aware of the problem.</p>
<blockquote class="twitter-tweet tw-align-center" data-theme="dark">
<p dir="ltr" lang="en">I wrote about this in my latest article:<a href="https://t.co/vh8aHGhxQL">https://t.co/vh8aHGhxQL</a></p>
<p>— Isaac King 🔍 (@IsaacKing314) <a href="https://twitter.com/IsaacKing314/status/2015195947534545083?ref_src=twsrc%5Etfw">January 24, 2026</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p data-start="935" data-end="1098"><a href="https://store.steampowered.com/app/464350/Screeps_World/">The game in question was <strong data-start="960" data-end="1001"><span class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"><span class="whitespace-normal">Screeps</span></span></strong>,</a> a long-running MMO RTS where players write real JavaScript code to control their in-game units.</p>
<h3 data-start="1100" data-end="1140">How The Screeps Vulnerability Worked</h3>
<div id="attachment_80281" style="width: 1290px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-80281" class="wp-image-80281 size-full" src="https://www.shanethegamer.com/wp-content/uploads/2026/01/STG-Cover-43.webp?x67281" alt="Screeps Steam game hack vulnerability" width="1280" height="840" srcset="https://www.shanethegamer.com/wp-content/uploads/2026/01/STG-Cover-43.webp 1280w, https://www.shanethegamer.com/wp-content/uploads/2026/01/STG-Cover-43-300x197.webp 300w, https://www.shanethegamer.com/wp-content/uploads/2026/01/STG-Cover-43-768x504.webp 768w, https://www.shanethegamer.com/wp-content/uploads/2026/01/STG-Cover-43-100x65.webp 100w, https://www.shanethegamer.com/wp-content/uploads/2026/01/STG-Cover-43-260x170.webp 260w" sizes="(max-width: 1280px) 100vw, 1280px" /><p id="caption-attachment-80281" class="wp-caption-text">Image Credit: Screeps, LLC</p></div>
<p data-start="1142" data-end="1385">Screeps is built around automation and scripting, with players using JavaScript to manage everything from resource collection to combat. In multiplayer worlds, players often rely on console logging to debug their code and track in-game events.</p>
<p data-start="1387" data-end="1718"><a href="https://outsidetheasylum.blog/screeps/">The issue highlighted in King’s article</a> centred on how the game handled console output. Screeps allowed HTML to be rendered directly through console.log calls, including unfiltered player-supplied input such as unit names. This meant malicious code could be injected and executed when another player’s client processed that output.</p>
<p data-start="1720" data-end="2015">While this behaviour was already risky in the browser version, it became far more serious in the Steam client. The Steam build reused browser code without proper sandboxing, meaning successful exploitation could result in full system-level access via the local machine, not just the game itself.</p>
<p data-start="2017" data-end="2155"><strong>In simple terms, interacting with the wrong player in a multiplayer world could potentially expose your computer to remote code execution.</strong></p>
<h3 data-start="2157" data-end="2207">Community Backlash And Accusations Of Inaction</h3>
<p data-start="2209" data-end="2531">The claims quickly gained traction, with players resurfacing old GitHub reports, Steam reviews, and Discord discussions alleging that the issue had been known for years. <a href="https://steamcommunity.com/profiles/76561198064518716/recommended/464350">One widely shared Steam review written by Isaac King himself described the client as insecure and accused the developers of ignoring a one-line fix while continuing to sell the game.</a></p>
<p data-start="2533" data-end="2748"><a href="https://outsidetheasylum.blog/screeps/og-review.png" data-rel="lightbox-image-0" data-rl_title="" data-rl_caption="" title="">Criticism intensified after screenshots showed earlier developer responses denying the existence of any serious vulnerability</a>, with some players accusing the studio of downplaying the risk and failing to warn users.</p>
<p data-start="2750" data-end="2903">As the story spread, Screeps’ reputation took a hit, despite the game maintaining a largely positive rating on <strong data-start="2861" data-end="2902"><span class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"><span class="whitespace-normal">Steam</span></span></strong>.</p>
<h3 data-start="2905" data-end="2962">Developers Roll Out A Hotfix After Article Goes Viral</h3>
<p data-start="2964" data-end="3160"><a href="https://store.steampowered.com/news/app/464350/view/516358814171138803">Following the viral spread of the article and social media posts, the Screeps developers acted quickly. Within hours, a hotfix was deployed on January 25, 2026, changing how console logging works.</a></p>
<p data-start="3162" data-end="3417">The update now escapes HTML by default in console.log, preventing injected scripts from executing. A new console.logUnsafe method was also added for advanced users who intentionally want to log styled HTML, shifting responsibility clearly onto the player.</p>
<p data-start="3419" data-end="3521">The fix effectively closed the exploit path that allowed arbitrary code execution in the Steam client.</p>
<h3 data-start="3523" data-end="3565">Developer Response And Ongoing Dispute</h3>
<p data-start="3567" data-end="3917">Despite implementing the fix, the Screeps developers have continued to dispute the characterisation of the issue. In public statements, GitHub replies, and a Steam news post, the team maintained that they did not consider the behaviour a true vulnerability, arguing that it involved player-written code and required specific circumstances to exploit.</p>
<p data-start="3919" data-end="4109">They also stated that they had never received verified reports of real-world harm resulting from the issue and cited limited resources as the reason the fix had not been prioritised earlier.</p>
<div id="attachment_80282" style="width: 621px" class="wp-caption aligncenter"><img decoding="async" aria-describedby="caption-attachment-80282" class="wp-image-80282 size-full" src="https://www.shanethegamer.com/wp-content/uploads/2026/01/image-2026-01-26T213050.901.webp?x67281" alt="Screeps Steam game hack vulnerability" width="611" height="173" srcset="https://www.shanethegamer.com/wp-content/uploads/2026/01/image-2026-01-26T213050.901.webp 611w, https://www.shanethegamer.com/wp-content/uploads/2026/01/image-2026-01-26T213050.901-300x85.webp 300w" sizes="(max-width: 611px) 100vw, 611px" /><p id="caption-attachment-80282" class="wp-caption-text">Image via Steam</p></div>
<p data-start="4111" data-end="4301">At the same time, the developers acknowledged that the situation was not ideal and apologised for misunderstandings, while notifying players of the change via email, Steam, and social media.</p>
<h3 data-start="4303" data-end="4338">What This Means For Players Now</h3>
<p data-start="4340" data-end="4606">With the hotfix live, Screeps is no longer vulnerable in the way described, and the Steam client is considered safe to use under the new logging system. Players who were concerned about security risks can now return to the game without needing additional safeguards.</p>
<p data-start="4608" data-end="4830">However, the incident has sparked broader discussion about transparency, security practices, and developer responsibility, particularly for games that blur the line between gameplay and real-world programming environments.</p>
<p data-start="4832" data-end="5038">For now,<a href="https://store.steampowered.com/app/464350/Screeps_World/"> Screeps remains available on Steam,</a> its core concept still praised by many players, but the controversy has left a lasting mark on how the community views its development and long-term stewardship.</p>
</span><p>The post <a href="https://www.shanethegamer.com/esports-news/steam-game-hack-vulnerability-screeps-fixed/">This Steam Game Allegedly Could Let Other Players Hack Your PC, And The Developer Has Now Responded</a> appeared first on <a href="https://www.shanethegamer.com">Shane the Gamer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.shanethegamer.com/esports-news/steam-game-hack-vulnerability-screeps-fixed/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 

Served from: www.shanethegamer.com @ 2026-05-01 17:14:30 by W3 Total Cache
-->