A fellow user of my configuration achieved an aac_move_elytra detection of
[23:27:41] [Server thread/INFO]: Scoring (163)
[23:27:41] [Server thread/INFO]: - The player has moved 94.3 blocks/min incorrectly with the elytra
[23:27:41] [Server thread/INFO]: - The player recently joined from a new ip address
[23:27:41] [Server thread/INFO]: - Insufficient data to analyse the player's interactions
[23:27:41] [Server thread/INFO]: - Insufficient data to analyse the player's movement
[23:27:41] [Server thread/INFO]: - Insufficient data to analyse the player's combat
[23:27:41] [Server thread/INFO]: Generated by AAC 5.0.11
They simply flew straight down at very high speeds using an elytra (from a very high y-level, like 1000)
Issue description
A fellow user of my configuration achieved an aac_move_elytra detection of
They simply flew straight down at very high speeds using an elytra (from a very high y-level, like 1000)
Debug: https://pastebin.com/GyETXsz6
Core information
Server version: 1.16.5
AAC version: 5.0.11
ProtocolLib version: 4.6.0
Configuration
Not configuration related, the false-positive achieved a reasonable VL for the subcategory that a regular hacker would