Back to Blog
Featured

WhyYouShouldn'tUseThird-PartyToolsinGachaGames:ASecurityGuide

Third-party tools for tracking pity and enhancing profiles in gacha games pose significant security risks that outweigh their apparent benefits. This analysis covers 16 popular gacha games, documenting 40+ third-party tools and their risks.

Miguel Angel
13 min read
Gaming
Gacha
Guide
Security

Why You Shouldn't Use Third-Party Tools in Gacha Games: A Security Guide

Third-party tools for tracking pity and enhancing profiles in gacha games pose significant security risks that outweigh their apparent benefits. While sites like Paimon.moe or StarRailStation promise features that games don't natively offer, their data extraction methods—from PowerShell scripts to MITM proxies—use techniques identical to those employed by malware, exposing authentication tokens and compromising player account integrity.

This analysis covers 16 popular gacha games from publishers like HoYoverse, Kuro Games, Hypergryph, Yostar, Nexon, and Sunborn, documenting more than 40 third-party tools, their technical methods, documented security incidents, and official policies that prohibit their use. The conclusion is clear: although native features may be more limited, they are infinitely safer.

Genshin ImpactHonkai Star RailZenless Zone Zero

The Third-Party Tools Ecosystem in Gacha Games

Tools for HoYoverse Games

HoYoverse has the most extensive third-party tools ecosystem, driven by the massive player base of Genshin Impact, Honkai: Star Rail, Zenless Zone Zero, and Honkai Impact 3rd.

Most Popular Pity and Wish Trackers:

ToolURLSupported GamesExtraction Method
Paimon.moepaimon.moeGenshin ImpactPowerShell script that reads local cache files and extracts authkey
StarRailStationstarrailstation.comHonkai: Star RailPowerShell script from GitHub Gist (get_warp_link_os.ps1)
StarDB.ggstardb.ggGenshin, HSR, ZZZPowerShell command (iwr -useb stardb.gg/warp | iex)
rng.moezzz.rng.moeZenless Zone ZeroURL extraction from game logs

Profile and Build Tools:

ToolURLFunctionMethod
Enka.Networkenka.networkCharacter showcaseUnofficial API that queries public data by UID
Akasha Systemakasha.cvDamage leaderboardsUses Enka.Network API

The most common method involves reading the output_log.txt file located in %userprofile%\AppData\LocalLow\miHoYo\[Game Name]\ to extract URLs containing the authkey parameter—a temporary authentication token valid for approximately 24 hours.

Tools for Wuthering Waves and Punishing Gray Raven

Kuro Games presents a smaller but equally risky ecosystem:

ToolURLMethod
WuWa Trackerwuwatracker.comReads Client.log to extract URL with player_id, svr_id, record_id
WuWaPalwuwapal.comSame URL extraction technique from convene history
Wuthering.appwutheringwaves.appURL import from PC, Android, iOS, PlayStation

The extracted URL has the format https://aki-gm-resources-oversea.aki-game.net/aki/gacha/index.html#/record?svr_id=XXXXX&player_id=XXXXXX, containing sensitive player identifiers.

Important note: Punishing Gray Raven has a native visible pity counter in the Research Logs menu, almost entirely eliminating the need for external tools.

Wuthering WavesPunishing Gray Raven

Tools for Arknights, Girls' Frontline, and Azur Lane

The Hypergryph, MICA Team, and Yostar ecosystem presents tools with particularly concerning methods:

The Alarming Case of Girls' Frontline 2:

ToolURLMethod
EXILIUM Trackerexilium.xyzHTTPS interception via Fiddler proxy
GFL2 HELPgfl2.helpRequires Fiddler Classic to decrypt HTTPS traffic

The GFL2 HELP tracker requires users to:

  1. Download Fiddler Classic (HTTP debugging proxy)
  2. Configure "Decrypt HTTPS traffic" — enabling man-in-the-middle interception
  3. Accept certificates and enable decryption
  4. Capture access tokens from intercepted API calls

This method is technically identical to a Man-in-the-Middle attack, exposing ALL device HTTPS traffic.

Arknights has a safer ecosystem with manual entry tools like Krooster and Arknights Toolbox, although recently (January 2026) it added official headhunting history accessible via the Yostar account center.

ArknightsGirls Frontline 2Azur Lane

Tools for Other Gacha Games

GameMain ToolsMethod
Reverse 1999Timekeeper.top, MobileMeta.ggRequire URL with temporary auth token
Blue ArchiveBlueArchive.gg, BA-ArmoryPrimarily manual entry (no auth trackers)
Brown Dust 2DotGGInformational guides only
SnowbreakSnowbreak.ggDatabase without account connection
Duet Night AbyssNone popularCosmetic gacha with native visible pity

Critical warning from MobileMeta.gg for Reverse 1999: "Please make sure you don't share this information with anyone else as it contains the temporary auth token associated with your account"


Technical Data Extraction Methods and Their Risks

Local Log File Parsing

How it works: PowerShell scripts read game log files to extract URLs containing authentication tokens.

Set-ExecutionPolicy Bypass -Scope Process -Force; iex "&{$((New-Object System.Net.WebClient).DownloadString('URL'))}"

Security risks:

  • Remote code execution without verification
  • Bypass of Windows security policies
  • Users cannot audit the code being executed
  • Technique identical to malware distribution

The most commonly accessed file is output_log.txt in the LocalLow folder of each game. HoYoverse patched the authkey exposure in logs in version 3.0, forcing tools to use more invasive methods like proxy mode.

Traffic Interception via MITM Proxy

How it works: Tools like Fiddler or mitmproxy act as intermediaries between the game and servers, intercepting and decrypting HTTPS traffic.

Critical risks:

  • Total traffic interception: A malicious tool can capture ALL network traffic, not just game data
  • Session token exposure: Authentication headers, cookies, and tokens become visible
  • System-level vulnerability: Installing root CA certificates allows decrypting ANY HTTPS traffic on the device
  • Credential theft potential: Passwords from other services would be exposed if the proxy is compromised

Chromium Browser Cache Parsing

Tools using this method: HoYo.Gacha, some genshin-wish-export forks

Process: Reads cache files in ...\webCaches\2.46.0.0\Cache\Cache_Data\ to extract API URLs with tokens.

Risk: Access to browser data that may contain sensitive information from other sessions.

Browser Console Scripts

High risk: Users paste JavaScript code directly into the browser console, enabling:

  • Arbitrary code execution
  • Session token theft
  • Access to cookies and localStorage
  • Vector for XSS attacks

Some tools request HoYoLAB authentication cookies (ltuid, ltoken). Unlike the authkey (valid ~24 hours), these cookies provide persistent access and can only be reset by changing the password.


Documented Security Incidents

Mass Account Thefts in Genshin Impact

The r/GenshinHacked subreddit emerged with more than 400 affected players reporting account theft. The main Genshin Impact subreddit suppresses these posts due to their volume—described as "too many of these posts." Players report losses of thousands of dollars in in-game purchases and items. miHoYo rejected refunds even when they acknowledged accounts were hacked.

Phishing Campaign with Fake Leak Database

In 2021, scammers created a website claiming to verify if accounts were compromised in a supposed "miHoYo data leak." The community detected that UIDs in the fake database had 8 digits instead of the correct 9. The creator had a history with hacking tools.

Blue Archive Hacked in August 2025

A hacker gained access to Blue Archive accounts to post images of the character "Koyuki" throughout the game. Nexon had to issue compensation packages including recruitment tickets, AP, and other resources.

Malware Distributed as Gaming Tools

  • RedLine malware: Responsible for 170 million stolen passwords in six months (47% of all analyzed stolen passwords)
  • Trojan.Scavenger: Disguises itself as cheats or enhancements for popular games, compromising crypto wallets and password managers
  • Stealka Infostealer: Distributed via GitHub and SourceForge as game mods, attacks 100+ browsers for autofill data and session cookies

Fake Wuthering Waves Website

A clone of the official Kuro Games site was detected (kurogames → kuropages URL) that collected sensitive information through fake pre-registration forms.


Terms of Service and Official Prohibitions

HoYoverse/miHoYo

Official statement on scripts, plug-ins, and third-party software:

"miHoYo strengthened anti-cheat mechanisms to better prevent the use of plug-ins and third-party software"

Key ToS terms:

  • "You are responsible for maintaining the confidentiality of your account information and if third parties use or access your account, you cannot claim compensation from COGNOSPHERE."
  • "Do not transfer or make available to third parties your account information."

November 2023 statement: "Some players have been using third-party violation tools such as mouse macros and automation scripts... seriously damages game fairness" — Penalties include account bans and recovery of illegally obtained rewards.

Kuro Games (Wuthering Waves, PGR)

From Wuthering Waves ToS: "Cheat means that in the Services (generally, 'Game'), users achieve or attempt to achieve an unfair competitive advantage through any program, method, software or hardware."

"Please note that we may collect and transfer detailed information about your KURO GAMES account, gamelogs and any unauthorized program."

Fair Play Policy:

  1. "Strict prohibition of third-party applications to disrupt gameplay experience"
  2. Penalties: account suspension or permanent ban

Kuro Games confirmed a wave of bans in January 2025 via Discord.

Nexon (Blue Archive) — The Most Restrictive

"Do not modify Cash Items or the Service... including, without limitation, creating cheats and/or hacks or using third-party software to access files in the Service"

"Reverse engineer, packet sniff, decompile or disassemble any portion of the Service"Explicitly prohibited

"Do not use 'packet sniffing,' scripting and/or macro software for any purpose"

Uses NGS (Nexon Game Security) — kernel-level anti-cheat.

Blue Archive

Yostar (Arknights, Azur Lane)

GamePress warning: "Yostar and Hypergryph warn that they will ban accounts using cheats, plug-ins or third-party software to modify in-game data."

From ToS:

  • Only operating one (1) account is allowed without written permission
  • Cannot sell, gift, trade or transfer accounts — "may result in permanent ban"

NEOWIZ (Brown Dust 2)

Cancelled Steam launch in December 2024 due to policy conflicts. Explicitly warns that use of third-party emulators may result in permanent bans.


Native Features Available in Each Game

HoYoverse Games

GameNative HistoryNative Pity CounterLimitation
Genshin Impact✅ Wish Menu → History (extended to 1 year since v4.5)❌ Requires manual countingHistory erases after 1 year
Honkai: Star Rail✅ Warp Menu → Records❌ Requires manual countingLimited history
Zenless Zone Zero✅ Signal History❌ Requires manual counting6 months retention
Honkai Impact 3rd✅ Supply History✅ Visible counter on bannersMore complete than other HoYoverse games

Other Games

GameHistoryVisible PityNotes
Wuthering Waves✅ Convene History❌ Manual countingOnly 6 months of data
Punishing Gray Raven✅ Research LogsVisible counterEliminates need for third parties
ArknightsNew January 2026✅ Visible on bannersSince "The Rolling Thunder" banner
GFL 1❌ Basic❌ NoLegacy system
GFL 2: Exilium✅ Recruitment → Details✅ VisibleOnly 6 months retention
Azur Lane✅ Construction log✅ On UR banners200 pulls guarantees UR ship
Reverse 1999✅ Summon History✅ Visible counterComplete native
Blue Archive✅ Pull History✅ Recruitment Points (200 = spark)Robust system
Brown Dust 2✅ Banner History✅ Pickup trackingInfinite Draw system
Snowbreak✅ Pull Records✅ Visible counterNative sufficient
Duet Night Abyss✅ Via Details button✅ Separated by bannerCosmetic gacha only
Arknights: EndfieldIn development✅ 65 soft pity, 80 hard pityPity carryover between banners

Key conclusion: All analyzed games have some form of native tracking. Although less sophisticated than third-party tools, it is completely safe.

Reverse 1999Brown Dust 2Snowbreak Containment Zone

biuuu/genshin-wish-export (3,800+ stars)

Security findings:

  • ⚠️ No SECURITY.md file
  • ⚠️ Proxy mode requires network interception
  • ⚠️ A fork removed auto-update "to avoid security concerns"
  • ⚠️ Issue #530 reports loss of 3+ years of history without recovery

MadeBaruna/paimon-moe (1,500+ stars)

Security findings:

  • ⚠️ Web service — data goes to external servers
  • ⚠️ Google Drive integration for sync (third-party exposure)
  • ⚠️ 302 open issues in repository
  • ⚠️ Scam-detector.com gives it 58.4 points — "high-risk activity related to phishing"

wuwatracker/wuwatracker (245+ stars)

Security findings:

  • ⚠️ Global statistics imply data aggregation on servers
  • ⚠️ Sync with Google account
  • ⚠️ No formal privacy policy in repository

Risk Level Summary by Method

MethodTools Using ItRisk Level
Proxy/MITMbiuuu proxy mode, GFL2 trackers🔴 CRITICAL
Web backendpaimon-moe, wuwatracker🔴 HIGH
PowerShell scriptsStarRailStation, StarDB, most🟠 HIGH
Chromium cacheHoYo.Gacha🟠 MEDIUM
Local log filesMost trackers🟡 MEDIUM
Public API (UID only)Enka.Network🟢 LOW
Manual entryCalculators, simulators✅ SAFE

Why Native Features Are Superior

Argument 1: Zero Authentication Token Exposure

Built-in features never expose authkeys, session tokens, or cookies to third parties. Everything happens within the game's official ecosystem.

Argument 2: No External Code Execution

No PowerShell scripts to execute, certificates to install, or proxies to configure. Completely eliminates the most common attack vector.

Argument 3: Guaranteed Official Support

If something goes wrong with your account using native features, official support can help. If you used third-party tools, publishers explicitly wash their hands: "you cannot claim compensation".

Argument 4: No Ban Risk

Although the ban risk for pity trackers is currently low, publishers can change their policies at any time. Tools "tolerated" today may become bannable tomorrow.

Argument 5: Data Under Your Complete Control

Native features don't send data to third-party servers with unknown or non-existent privacy policies.


Security Recommendations for Gacha Players

  1. Never execute downloaded PowerShell scripts to get game data — use exclusively in-game features
  2. Don't install root CA certificates from third-party tools under any circumstances
  3. Don't share URLs containing authkey or authentication tokens
  4. Enable 2FA on all game accounts that support it (Yostar, HoYoverse)
  5. Use unique passwords for each game — credential stuffing is a real attack vector
  6. Distrust tools that ask for login credentials directly
  7. If the game has native tracking, use it instead of external tools
  8. Keep a manual record of your pity if the game doesn't offer a counter — it's tedious but safe

Conclusion: The Risk Doesn't Justify the Convenience

Third-party tools for gacha games offer more attractive interfaces and features that developers don't provide natively. However, their technical methods — PowerShell scripts with security bypass, MITM interception of HTTPS traffic, extraction of authentication tokens — are indistinguishable from malware techniques.

The 170 million passwords stolen by RedLine malware in six months demonstrate that attackers actively exploit gamers' trust in unofficial tools. Documented phishing incidents in the Genshin Impact community, the Blue Archive hack in 2025, and explicit warnings from all major publishers reinforce this reality.

All analyzed games offer native history and pity tracking features. Although more limited, they completely eliminate the attack vectors that third-party tools introduce. The question isn't whether third-party tools are convenient — they are — but whether that convenience is worth the risk of losing an account with hundreds or thousands of dollars invested.

The answer, from a computer security perspective, is unequivocally no.


References and Sources

Official Publisher Documentation

  • HoYoverse Terms of Service: tot.hoyoverse.com/en-us/terms
  • HoYoverse Security Advisory: genshin.hoyoverse.com/en/news/detail/5763
  • Kuro Games ToS: wutheringwaves.kurogames.com/p/language_en/terms_of_service.html
  • Nexon Terms of Service: m.nexon.com/terms/304
  • Yostar ToS: yostar.co.jp/terms-and-conditions.html
  • Sunborn Privacy Policy: gf.sunborngame.com/privacy_policy.php
  • Bluepoch User Agreement: re1999.bluepoch.com/gameprotocol/en/userAgreement.html
  • Seasun ToS: snowbreak.amazingseasun.com/show-631-2-1.html

Third-Party Tools Analyzed

  • Paimon.moe: paimon.moe | GitHub: github.com/MadeBaruna/paimon-moe
  • StarRailStation: starrailstation.com/en/warp
  • Enka.Network API: github.com/EnkaNetwork/API-docs
  • WuWa Tracker: wuwatracker.com | GitHub: github.com/wuwatracker/wuwatracker
  • GFL2 HELP: gfl2.help/en/pulls
  • biuuu/genshin-wish-export: github.com/biuuu/genshin-wish-export
  • HoYo.Gacha: github.com/lgou2w/HoYo.Gacha
  • MobileMeta.gg Reverse 1999: reverse1999.mobilemeta.gg/summon

Security Reports

  • Bitdefender Genshin Scams (2025): bitdefender.com/en-us/blog/hotforsecurity/genshin-impact-scams-players-games-2026
  • Kaspersky Stealka Infostealer: kaspersky.com/blog/windows-stealer-stealka/55058/
  • Kaspersky Genshin Driver Exploit: usa.kaspersky.com/blog/genshin-driver-attack/27034/
  • Specops Credential Stealing Malware: specopssoft.com/blog/top-password-credential-stealing-malware/
  • TheGamer Account Theft Report: thegamer.com/genshin-impact-stolen-accounts-hacked-tfa/

Documented Incidents

  • GamerBraves Phishing Scam: gamerbraves.com/genshin-impact-community-spots-potential-phishing-scam/
  • GamerBraves PGR Twitter Hack: gamerbraves.com/punishing-gray-raven-global-twitter-account-got-hacked-to-promote-crypto/
  • Dexerto Blue Archive Hack: dexerto.com/gaming/hacker-breaks-into-gacha-game-just-to-post-one-anime-girl-everywhere-3245982/
  • Yardbarker Wuthering Waves Bans: yardbarker.com/video_games/articles/kuro_games_confirms_wuthering_waves_bans
  • WuWa Fake Website: wutheringwaves.gg/beware-of-the-fake-wuthering-waves-official-website/

Communities and Discussions

  • r/GenshinHacked (stolen accounts subreddit)
  • GamePress Arknights Ban Warning: ak.gamepress.gg/news/arknights-warning-bans-incoming
  • Steam Community Wuthering Waves ACE discussions
  • UIGF Standard: uigf.org/en/standards/uigf-legacy-v4.0.html

Last updated: February 2026

Disclaimer: This report is for informational and educational purposes only. It does not constitute legal or security advice. Use of third-party tools is at your own risk. Always verify current policies of each game before using any external service.

Share: