Evoworld Application mod/download and see all files + mod menu for free! was reported 27-04-2026 for Missing, non-informative, or misleading description

The reporter said:

Report of Possible Rule Violation on Greasy Fork

This script is being reported for misleading description and for redirecting the user to an external download that appears to contain the supposed real functionality.

Summary of the issue

The script is presented as a tool to:

  • access EvoWorld files,
  • download a supposed application,
  • show “all files,”
  • and include a “mod menu.” However, the visible code does not implement any of those functions. What it actually does is:
  • create a floating button on the page,
  • display promotional messages in the console,
  • and open an external MediaFire URL pointing to a ZIP file. ## Behavior observed in the code The script’s actual behavior is as follows:
  • It creates a div element with the text 📁 Evoworld Files.
  • It positions it as a floating button on the screen.
  • When clicked, it executes window.open(...).
  • The opened URL is an external MediaFire download: https://www.mediafire.com/file/iqqtrag1hlfr02a/EvoWorld_Elite-win32-x64.zip/file
  • It also prints promotional messages in the console claiming that “game files” and a “mod menu” were loaded. ## Reason for the report The main reason for this report is that the script description does not match its actual functionality. The code published on Greasy Fork does not contain:
  • a game file explorer,
  • a system to “view all files,”
  • a functional “mod menu,”
  • or any visible implementation of the supposed application being advertised. In practice, the script acts as an intermediary to push the user toward downloading an external ZIP file. This prevents users from verifying through the published code what real functionality is ultimately being offered. ## Possible rule violation This behavior appears to be incompatible with Greasy Fork’s rules for several reasons:
  • The main functionality is not actually present in the published code.
  • An external download URL is used as the script’s primary destination.
  • The description is misleading in relation to the observable behavior.
  • Users cannot audit the supposed main function from the code published on Greasy Fork. ## Risk to users The observed pattern is risky because it:
  • uses a visible and seemingly simple script as bait,
  • shifts the promised value to an external ZIP file,
  • and makes it harder for the user to determine what they are really installing or running. This report does not conclusively claim that the external file is malware without additional analysis of the ZIP, but there is sufficient basis for moderation due to deception, external redirection, and possible risk to users. ## Request for review Please review this script for possible violation of Greasy Fork’s rules, particularly for:
  • misleading description,
  • main functionality missing from the published code,
  • and use of an external download as the central element of the script. It is also requested that you determine whether the script should be removed or whether the author should be required to publish only verifiable code whose description matches what it actually does.

Dev_Kra (the reported user) has made:

This report has been upheld by a moderator, but the moderator marked it as Disallowed external code.