Interesting, I'd never seen this before. That could be a problem. But it's pretty simple to block this actually. It isn't really a client side cvar (which I don't believe are blockable anyways), just a client command that does come in contact with the server, so it is indeed blockable.
This should do the trick:
Code:
#include <amxmodx>
public plugin_init() {
register_clcmd("fullupdate", "cmd_fullupdate")
}
public cmd_fullupdate(id) {
return PLUGIN_HANDLED
}
All you really needed to do is register the command like any other client command and return PLUGIN_HANDLED to block. I just tested this out and it seems to block it. Hope this helps.