Steam now requires game devs to disclose kernel-level anti-cheats


Valve, the company behind the games and software distribution platform Steam, has introduced a change requiring developers to disclose if their games use kernel-level anti-cheat systems.

Highly privileged kernel access may introduce significant security risks, and, as demonstrated in the past, any vulnerability in the software with this access could be exploited to completely compromise the system.

Valve now requires game developers to disclose any anti-cheat software that is installed with the game. The data will be displayed to Steam Store users on the game’s storefront.

ADVERTISEMENT

“Players have been requesting more transparency around the anti-cheat services used in games, as well as the existence of any additional software that will be installed within the game,” Valve said.

“Going forward, when you submit a new game to Steam, if your game installs a client-side, kernel mode anti-cheat, you will need to fill out this new field.”

anti-heat-steam

The company will also be going through old games and contacting developers if they fall into this category.

Disclosing not kernel-based anti-cheat systems will remain optional.

Valve also now requires developers to disclose if older games do not fully remove files upon uninstall. New games should have uninstall scripts that clean all files created or modified by the installation process.

“Players need to know if any anti-cheat utilities have left files behind, especially those that modify OS kernel files.”

Stefanie Gintaras Radauskas Niamh Ancell BW Paulius Grinkevičius B&W
Don’t miss our latest stories on Google News
ADVERTISEMENT

Many incidents happened in the past when third-party software running at the kernel level put users at risk. For example, Dark Souls 3’s anti-cheat exploit allowed malicious attackers to execute remote code, leading to developers shutting down PVP servers in 2022.

Some anti-cheat systems, like Genshin Impact’s, remained active even when the game was uninstalled, and it was abused by ransomware. CrowdStrike, a security tool working at the kernel level, crashed 8.5 million systems worldwide recently.

Anti-cheat software developers argue that kernel-level access is needed to combat cheat software, which often runs with the same highest privileges.