Skip to content

Unremovable Friend Request

Introduction

The “Unremovable Friend Request” exploit was initially discovered in late 2020 by a user known as Saad. At the time, the vulnerability was not widely known, yet the development team was able to patch it within a week. Despite this, existing unremovable friend requests have remained persistent in the system.

Technical breakdown of the original exploit

The vulnerability stemmed from improper handling of friend-code string lengths in the game’s backend. Specifically:

  • Users could set a friend_code value that was excessively long, causing a buffer overflow in the friend system.
  • This overflow resulted in the removal of the identifier suffix (e.g., username#1234username#), thereby corrupting the internal representation of the user tag.
  • If the overflow was too large, the system failed to process the friend-code, yet still allowed it to send friend requests.
  • These requests became unremovable and unconfirmable on the recipient’s side, effectively leaving them in a persistent, unmanageable state.

Artifact

Example 1 Example 2

Patch & mitigation measures

The exploit was mitigated shortly after its discovery through a server-side input validation:

  • A length constraint was introduced on the friend-code update request, effectively preventing overflow conditions.
  • It is unclear whether any additional backend modifications were implemented to harden the system against similar future vulnerabilities.

Current status and future

As of writing this, the server-side check has been effective for over five years. However:

  • In 2023, a new bypass method was privately rediscovered, but has not been publicly disclosed.
  • This updated method has only been shared among trusted individuals, and the developers remain unaware of its existence.
  • Given the developers’ historical response time, a silent patch could be expected once the new bypass becomes known internally.