Skip to content

Unremovable Friend Request

The “Unremovable Friend Request” exploit was initially discovered in late 2020 by a user known as Saad. At the time, the vulnerability was not widely known, yet the development team was able to patch it within a week. Despite this, existing unremovable friend requests have remained persistent in the system.

Technical breakdown of the original exploit

Section titled “Technical breakdown of the original exploit”

The vulnerability stemmed from improper handling of friend-code string lengths in the game’s backend. Specifically:

  • Users could set a friend_code value that was excessively long, causing a buffer overflow in the friend system.
  • This overflow resulted in the removal of the identifier suffix (e.g., username#1234username#), thereby corrupting the internal representation of the user tag.
  • If the overflow was too large, the system failed to process the friend-code, yet still allowed it to send friend requests.
  • These requests became unremovable and unconfirmable on the recipient’s side, effectively leaving them in a persistent, unmanageable state.

Example 1 Example 2

The exploit was mitigated shortly after its discovery through a server-side input validation:

  • A length constraint was introduced on the friend-code update request, effectively preventing overflow conditions.
  • It is unclear whether any additional backend modifications were implemented to harden the system against similar future vulnerabilities.

As of writing this, the server-side check has been effective for over five years. However:

  • In 2023, a new bypass method was privately rediscovered, but has not been publicly disclosed.
  • This updated method has only been shared among trusted individuals, and the developers remain unaware of its existence.
  • Given the developers’ historical response time, a silent patch could be expected once the new bypass becomes known internally.