Unreal 01 Vaultinventory

C 64 completed
Other
unknown / markdown · small
308
Files
42,749
LOC
1
Frameworks
13
Languages

Pipeline State

completed
Run ID
#1546217
Phase
done
Progress
0%
Started
2026-04-16 23:51:05
Finished
2026-04-16 23:51:05
LLM tokens
0

Pipeline Metadata

Stage
Cataloged
Decision
proceed
Novelty
49.00
Framework unique
Isolation
Last stage change
2026-05-10 03:34:57
Deduplication group #47444
Member of a group with 83 similar repo(s) · framework reactcanonical #186079 view group →
Repobility · code-quality intelligence · https://repobility.com

AI Prompt

Create a blueprint-driven, server-authoritative inventory system for Unreal Engine 5. I need this to be a production-grade, fragment-based plugin. It must support both local single-player mode using SQLite for state and cloud live-service mode using either Supabase (preferred) or AWS DynamoDB. Key features include a zero-trust validation engine, mandatory audit logging with UTC timestamps, and robust anti-cheat measures like transactional locking and rate limiting. The system should use Gameplay Tags for item identification and support modular item composition via UItemFragment objects.
unreal-engine ue5 inventory cpp blueprint server-authoritative supabase dynamodb sqlite game-dev networking
Generated by gemma4:latest

Catalog Information

Create a blueprint-driven, server-authoritative inventory system for Unreal Engine 5. I need this to be a production-grade, fragment-based plugin. It must support both local single-player mode using SQLite for state and cloud live-service mode using either Supabase (preferred) or AWS DynamoDB. Key features include a zero-trust validation engine, mandatory audit logging with UTC timestamps, and robust anti-cheat measures like transactional locking and rate limiting. The system should use Gameplay

Tags

unreal-engine ue5 inventory cpp blueprint server-authoritative supabase dynamodb sqlite game-dev networking

Quality Score

C
64.3/100
Structure
50
Code Quality
87
Documentation
75
Testing
15
Practices
65
Security
92
Dependencies
80

Strengths

  • CI/CD pipeline configured (github_actions)
  • Consistent naming conventions (PascalCase)
  • Good security practices — no major issues detected

Weaknesses

  • No LICENSE file — legal ambiguity for contributors
  • No tests found — high risk of regressions
  • 5 files with critical complexity need refactoring
  • 2066 duplicate lines detected — consider DRY refactoring
  • 7 'god files' with >500 LOC need decomposition

Recommendations

  • Add a test suite — start with critical path integration tests
  • Add a linter configuration to enforce code style consistency
  • Add a LICENSE file (MIT recommended for open source)

Languages

markdown
42.5%
cpp
42.2%
c
9.1%
text
2.5%
json
0.9%
sql
0.7%
typescript
0.5%
yaml
0.5%
python
0.4%
ini
0.3%
csharp
0.2%
shell
0.1%

Frameworks

React

Symbols

method424
function60
enum10
variable8
class6
module6
constant5
struct5
macro4

API Endpoints (9)

Same analyzer free for public repos: https://repobility.com
MethodPathHandlerFramework
Repobility's GitHub App fixes findings like these · https://github.com/apps/repobility-bot
GETAuthorizationheaders.getExpress
GETAuthorizationheaders.getExpress
GETAuthorizationheaders.getExpress
GETSUPABASE_SERVICE_ROLE_KEYenv.getExpress
GETSUPABASE_SERVICE_ROLE_KEYenv.getExpress
GETSUPABASE_SERVICE_ROLE_KEYenv.getExpress
GETSUPABASE_URLenv.getExpress
GETSUPABASE_URLenv.getExpress
GETSUPABASE_URLenv.getExpress

Quality Timeline

1 quality score recorded.

View File Metrics
Want this analysis on your repo? https://repobility.com/scan/

Embed Badge

Add to your README:

![Quality](https://repos.aljefra.com/badge/1369992.svg)
Quality BadgeSecurity Badge
Export Quality CSVDownload SBOMExport Findings CSV