The RBXM/Asset Analyzer is a security inspection tool for .rbxm and .rbxmx model/package files. Before you import a free model or third-party asset into your game, drop it into the Analyzer to see exactly what is inside — scripts, asset references, and potential red flags.


How to Use

  1. Click RBXM/Asset Analyzer in the sidebar.
  2. Import a model:
    • By Roblox Asset ID: Enter the ID and the app downloads the file via Open Cloud.
    • By local file: Drag and drop an .rbxm or .rbxmx file onto the window.
  3. The app decompresses and parses the XML binary, then shows:

Summary

  • File format, file size, instance count, maximum tree depth, script count, and asset reference count.

Risk Rating

A color-coded overall rating:

RatingMeaning
GoodNo issues found. Safe to use.
OKMinor findings but nothing dangerous.
WarningPotentially concerning content — review carefully.
Would Not TouchMultiple serious findings. Likely malicious.
HoneypotClear malicious intent. Do not import.

Instance Tree

  • An interactive collapsible tree of every instance in the model.
  • Color-coded icons: green (clean), orange (warning), red (blocker), blue (asset references).
  • Click any node to inspect its properties.

Asset References

  • A table of every Roblox asset ID referenced in the model.
  • Inferred asset types and sortable columns.

Security Findings

The analyzer detects:

  • Remote module loads (require() with external IDs) — potential data exfiltration.
  • External URLs and webhook URLs — could send player data to third-party servers.
  • Obfuscated script payloads — heavily encoded or minified scripts that hide their purpose.
  • Sensitive service usage — TeleportService, MarketplaceService, DataStoreService, etc.
  • Per-frame connectionsHeartbeat or RenderStepped loops that run every frame.
  • Potentially infinite loopswhile true patterns without yields.

Help & Tips

  • Always scan free models. The Analyzer is your first line of defense before importing untrusted assets.
  • Obfuscated code is a red flag. Legitimate models rarely obfuscate their scripts. If you see ByteStringValue or heavily encoded strings, be suspicious.
  • Save models locally: Use Save File to download a copy of the model to your Mac for offline inspection.

FAQ

Does the Analyzer execute any scripts?

No. It parses the XML structure of .rbxm/.rbxmx files statically. No Lua code is executed.

Can it detect every malicious model?

It catches common patterns, but determined attackers can bypass static analysis. The Analyzer is a valuable first check, not a guarantee. Always review suspicious models manually.

What is the difference between .rbxm and .rbxmx?

.rbxm is the binary XML format. .rbxmx is the human-readable XML format. The Analyzer handles both.

Can I analyze a model I already have in my place?

Export the model from Studio as an .rbxm file, then open it in the Analyzer. There is no direct “analyze selection from Studio” action yet.