And what is hacking about - if not “abusing broken security assets”? Most hackers do not program at all - they are “just (ab)using” programs written by others to exploit gaps in security systems. Seams quite similar to me…
And by the way, whether this is hacking, cheating or exploiting in the end might be splitting hairs:)
At least for the evaluation of the effect…
Some people are not getting tired saying “no cheats out there at all”. Maybe, we have the proof, that this is not true, here?
Or, at least, in your terms, of “an exploit which comes very close to what you would want to achieve with a proper cheat”…