After a deep evaluation of each code, line-by-line. I have gathered that the only infected file is main.js. Simply delete the file and you should be good to run it. The remainder of the files is clean - Another thing that i found was located in the server.lua
"local brutalloads = LoadResourceFile("brutal_policejob", "server/dataa.dd")
assert(load(brutalloads))()"
I would suggest commenting these lines of code out, or avoiding using the resource as a whole.
File
Status
Notes
cl_utils.lua
✅ Clean
Uses only expected events for UI, inventory, and job logic.
sv_utils.lua
✅ Clean
Notification and inventory functions. Webhook is a placeholder.
client/client.lua
✅ Clean
Main client script; all events are legit and static.
config.lua
✅ Clean
Purely configuration; no execution logic.
fxmanifest.lua
✅ Clean
Loads resource files, defines metadata. No obfuscation.
core/client-core.lua
✅ Clean
Framework abstraction for QBCore/ESX. No dynamic behavior.
core/server-core.lua
✅ Clean
Safe exports for money, inventory, identity. No backdoors.
After a deep evaluation of each code, line-by-line. I have gathered that the only infected file is main.js. Simply delete the file and you should be good to run it. The remainder of the files is clean.