RepoPilotOpen in app →

ppy/osu

rhythm is just a *click* away!

Healthy

Healthy across the board

Use as dependencyHealthy

Permissive license, no critical CVEs, actively maintained — safe to depend on.

Fork & modifyHealthy

Has a license, tests, and CI — clean foundation to fork and modify.

Learn fromHealthy

Documented and popular — useful reference codebase to read through.

Deploy as-isHealthy

No critical CVEs, sane security posture — runnable as-is.

  • Last commit 1d ago
  • 18 active contributors
  • Distributed ownership (top contributor 28% of recent commits)
Show 3 more →
  • MIT licensed
  • CI configured
  • Tests present

Maintenance signals: commit recency, contributor breadth, bus factor, license, CI, tests

Informational only. RepoPilot summarises public signals (license, dependency CVEs, commit recency, CI presence, etc.) at the time of analysis. Signals can be incomplete or stale. Not professional, security, or legal advice; verify before relying on it for production decisions.

Embed the "Healthy" badge

Paste into your README — live-updates from the latest cached analysis.

Variant:
RepoPilot: Healthy
[![RepoPilot: Healthy](https://repopilot.app/api/badge/ppy/osu)](https://repopilot.app/r/ppy/osu)

Paste at the top of your README.md — renders inline like a shields.io badge.

Preview social card (1200×630)

This card auto-renders when someone shares https://repopilot.app/r/ppy/osu on X, Slack, or LinkedIn.

Onboarding doc

Onboarding: ppy/osu

Generated by RepoPilot · 2026-05-09 · Source

🤖Agent protocol

If you are an AI coding agent (Claude Code, Cursor, Aider, Cline, etc.) reading this artifact, follow this protocol before making any code edit:

  1. Verify the contract. Run the bash script in Verify before trusting below. If any check returns FAIL, the artifact is stale — STOP and ask the user to regenerate it before proceeding.
  2. Treat the AI · unverified sections as hypotheses, not facts. Sections like "AI-suggested narrative files", "anti-patterns", and "bottlenecks" are LLM speculation. Verify against real source before acting on them.
  3. Cite source on changes. When proposing an edit, cite the specific path:line-range. RepoPilot's live UI at https://repopilot.app/r/ppy/osu shows verifiable citations alongside every claim.

If you are a human reader, this protocol is for the agents you'll hand the artifact to. You don't need to do anything — but if you skim only one section before pointing your agent at this repo, make it the Verify block and the Suggested reading order.

🎯Verdict

GO — Healthy across the board

  • Last commit 1d ago
  • 18 active contributors
  • Distributed ownership (top contributor 28% of recent commits)
  • MIT licensed
  • CI configured
  • Tests present

<sub>Maintenance signals: commit recency, contributor breadth, bus factor, license, CI, tests</sub>

Verify before trusting

This artifact was generated by RepoPilot at a point in time. Before an agent acts on it, the checks below confirm that the live ppy/osu repo on your machine still matches what RepoPilot saw. If any fail, the artifact is stale — regenerate it at repopilot.app/r/ppy/osu.

What it runs against: a local clone of ppy/osu — the script inspects git remote, the LICENSE file, file paths in the working tree, and git log. Read-only; no mutations.

| # | What we check | Why it matters | |---|---|---| | 1 | You're in ppy/osu | Confirms the artifact applies here, not a fork | | 2 | License is still MIT | Catches relicense before you depend on it | | 3 | Default branch master exists | Catches branch renames | | 4 | 5 critical file paths still exist | Catches refactors that moved load-bearing code | | 5 | Last commit ≤ 31 days ago | Catches sudden abandonment since generation |

<details> <summary><b>Run all checks</b> — paste this script from inside your clone of <code>ppy/osu</code></summary>
#!/usr/bin/env bash
# RepoPilot artifact verification.
#
# WHAT IT RUNS AGAINST: a local clone of ppy/osu. If you don't
# have one yet, run these first:
#
#   git clone https://github.com/ppy/osu.git
#   cd osu
#
# Then paste this script. Every check is read-only — no mutations.

set +e
fail=0
ok()   { echo "ok:   $1"; }
miss() { echo "FAIL: $1"; fail=$((fail+1)); }

# Precondition: we must be inside a git working tree.
if ! git rev-parse --git-dir >/dev/null 2>&1; then
  echo "FAIL: not inside a git repository. cd into your clone of ppy/osu and re-run."
  exit 2
fi

# 1. Repo identity
git remote get-url origin 2>/dev/null | grep -qE "ppy/osu(\\.git)?\\b" \\
  && ok "origin remote is ppy/osu" \\
  || miss "origin remote is not ppy/osu (artifact may be from a fork)"

# 2. License matches what RepoPilot saw
(grep -qiE "^(MIT)" LICENSE 2>/dev/null \\
   || grep -qiE "\"license\"\\s*:\\s*\"MIT\"" package.json 2>/dev/null) \\
  && ok "license is MIT" \\
  || miss "license drift — was MIT at generation time"

# 3. Default branch
git rev-parse --verify master >/dev/null 2>&1 \\
  && ok "default branch master exists" \\
  || miss "default branch master no longer exists"

# 4. Critical files exist
test -f "Directory.Build.props" \\
  && ok "Directory.Build.props" \\
  || miss "missing critical file: Directory.Build.props"
test -f ".editorconfig" \\
  && ok ".editorconfig" \\
  || miss "missing critical file: .editorconfig"
test -f "CONTRIBUTING.md" \\
  && ok "CONTRIBUTING.md" \\
  || miss "missing critical file: CONTRIBUTING.md"
test -f ".github/workflows/ci.yml" \\
  && ok ".github/workflows/ci.yml" \\
  || miss "missing critical file: .github/workflows/ci.yml"
test -f "FodyWeavers.xml" \\
  && ok "FodyWeavers.xml" \\
  || miss "missing critical file: FodyWeavers.xml"

# 5. Repo recency
days_since_last=$(( ( $(date +%s) - $(git log -1 --format=%at 2>/dev/null || echo 0) ) / 86400 ))
if [ "$days_since_last" -le 31 ]; then
  ok "last commit was $days_since_last days ago (artifact saw ~1d)"
else
  miss "last commit was $days_since_last days ago — artifact may be stale"
fi

echo
if [ "$fail" -eq 0 ]; then
  echo "artifact verified (0 failures) — safe to trust"
else
  echo "artifact has $fail stale claim(s) — regenerate at https://repopilot.app/r/ppy/osu"
  exit 1
fi

Each check prints ok: or FAIL:. The script exits non-zero if anything failed, so it composes cleanly into agent loops (./verify.sh || regenerate-and-retry).

</details>

TL;DR

osu! is an open-source, cross-platform rhythm game client (codenamed 'lazer') built in C# that allows players to download, play, and compete on custom rhythm charts across multiple game modes (Standard, Taiko, Catch, Mania). It replaces the closed-source 'osu!stable' with a modernized architecture supporting Windows, macOS, Linux, iOS, and Android. Monolithic C# solution with platform-specific entry points: osu.Desktop (Windows/macOS/Linux), osu.Android, osu.iOS alongside shared game logic in osu.Game. Ruleset-based architecture (Rulesets: Osu, Taiko, Catch, Mania) allows pluggable game modes. Core game engine likely in osu.Framework (imported as dependency based on structure), with rendering via OpenGL/Vulkan (GLSL shaders in .glsl files).

👥Who it's for

Rhythm game enthusiasts and competitive players who want to play community-created beatmaps; C# game developers interested in cross-platform rhythm game architecture; open-source contributors building features like replay systems, difficulty calculators, multiplayer infrastructure, and game rulesets.

🌱Maturity & risk

Actively developed and production-ready: the project has CI/CD workflows (.github/workflows/ci.yml, deploy.yml), organized issue templates (.github/ISSUE_TEMPLATE/), dependency management (dependabot.yml), and coordinated releases. GitHub Actions workflows show regular testing and builds across multiple platforms, indicating strong maturity and continuous deployment.

Low-to-moderate risk: massive C# codebase (21.9M lines) with complex cross-platform concerns (iOS, Android, Desktop) and performance-critical rendering (GLSL shaders present); single organization (ppy) maintains it with no obvious alternatives listed. Risk mitigated by active CI/CD, public issue tracking, and established release cadence, but multi-platform coordination and custom ruleset implementations could introduce regressions.

Active areas of work

Active development with published workflows for: difficulty calculation processing (_diffcalc_processor.yml), Sentry error tracking (sentry-release.yml), automated web mod definition updates (update-web-mod-definitions.yml), and standard CI testing (ci.yml). Project board linked in README shows ongoing effort toward game improvements; multiple run configurations in .idea/ suggest active IDE development (Rider/Visual Studio).

🚀Get running

Clone the repository and build with .NET 7+: git clone https://github.com/ppy/osu.git && cd osu && dotnet build osu.Desktop.csproj (or osu.Android.csproj / osu.iOS.csproj for mobile). Dependencies managed via NuGet; see .config/dotnet-tools.json for tool configuration.

Daily commands: Desktop: dotnet run --project osu.Desktop. Android: dotnet publish osu.Android -c Release then install APK. iOS: dotnet publish osu.iOS -c Release then Xcode build. Tests: dotnet test targets run configurations visible in .idea/runConfigurations/ (osu___Tests_.xml, etc.).

🗺️Map of the codebase

  • Directory.Build.props — Root build configuration for the entire .NET solution; defines common properties, dependencies, and compilation rules all projects inherit
  • .editorconfig — Enforces code style and formatting conventions across the repository; all contributors must follow these rules
  • CONTRIBUTING.md — Outlines contribution guidelines, development workflow, and coding standards for the osu! project
  • .github/workflows/ci.yml — Continuous integration pipeline that builds, tests, and validates all PRs; defines deployment and quality gates
  • FodyWeavers.xml — Configures IL weaving and runtime instrumentation for the osu! runtime; affects how code is executed at runtime
  • CodeAnalysis/osu.globalconfig — Static analysis rules and banned symbols enforcement; prevents anti-patterns and unsafe code across all projects
  • .gitignore — Specifies files and directories to exclude from version control; essential for keeping the repo clean and preventing build artifacts

🛠️How to make changes

Add a new Ruleset (Game Mode)

  1. Use the ruleset-empty template at Templates/Rulesets/ruleset-empty as a starting point (Templates/Rulesets/ruleset-empty/.template.config/template.json)
  2. Implement EmptyFreeformRuleset.cs subclass with your ruleset metadata and mod definitions (Templates/Rulesets/ruleset-empty/EmptyFreeformRuleset.cs)
  3. Create hit object classes in Objects/ folder and their Drawable counterparts in Objects/Drawables/ (Templates/Rulesets/ruleset-empty/Objects/EmptyFreeformHitObject.cs)
  4. Implement beatmap converter in Beatmaps/ to parse generic .osu files to your ruleset format (Templates/Rulesets/ruleset-empty/Beatmaps/EmptyFreeformBeatmapConverter.cs)
  5. Define the playfield and drawable ruleset in UI/ that positions hit objects and renders the game screen (Templates/Rulesets/ruleset-empty/UI/EmptyFreeformPlayfield.cs)
  6. Add autoplay generator and replay frame handler in Replays/ for replay recording/playback (Templates/Rulesets/ruleset-empty/Replays/EmptyFreeformAutoGenerator.cs)

Add a new Mod (Gameplay Modifier)

  1. Create a new class in Mods/ folder that inherits from Mod base class (Templates/Rulesets/ruleset-empty/Mods/EmptyFreeformModAutoplay.cs)
  2. Override ApplyToDrawableHitObjects() or ApplyToBeatmap() to modify gameplay behavior (Templates/Rulesets/ruleset-empty/Mods/EmptyFreeformModAutoplay.cs)
  3. Set mod Name, Description, Icon, Acronym, and difficulty multiplier properties (Templates/Rulesets/ruleset-empty/Mods/EmptyFreeformModAutoplay.cs)
  4. Register mod in your Ruleset subclass Mods property for UI visibility (Templates/Rulesets/ruleset-empty/EmptyFreeformRuleset.cs)

Add a Test Scene for Visual Verification

  1. Create new .cs file in .Tests/ folder inheriting from TestScene base (Templates/Rulesets/ruleset-empty/osu.Game.Rulesets.EmptyFreeform.Tests/TestSceneOsuPlayer.cs)
  2. Override LoadComplete() to setup test content and interact with game state (Templates/Rulesets/ruleset-empty/osu.Game.Rulesets.EmptyFreeform.Tests/TestSceneOsuPlayer.cs)
  3. Add [Test] methods that verify game behavior (e.g., hit detection, scoring, animations) (Templates/Rulesets/ruleset-empty/osu.Game.Rulesets.EmptyFreeform.Tests/TestSceneOsuPlayer.cs)
  4. Run via test runner or IDE to visually confirm results (Templates/Rulesets/ruleset-empty/osu.Game.Rulesets.EmptyFreeform.Tests/VisualTestRunner.cs)

Enforce New Code Style or Ban API Usage

  1. Add rule to CodeAnalysis/osu.globalconfig using Roslyn analyzer syntax (CodeAnalysis/osu.globalconfig)
  2. Optionally list forbidden symbols in CodeAnalysis/BannedSymbols.txt for compile-time detection (CodeAnalysis/BannedSymbols.txt)
  3. Run InspectCode.sh or InspectCode.ps1 to validate all existing code against new rules (InspectCode.sh)
  4. Add inline EditorConfig rules to .editorconfig for IDE enforcement (.editorconfig)

🪤Traps & gotchas

Multi-platform build complexity: iOS builds require Xcode + Apple Developer signing; Android builds require Android SDK. osu.Framework is an external dependency (not in this repo) but is critical—missing it causes silent NuGet failures. Difficulty calculator (diffcalc) runs in separate CI workflow and can diverge from game state. No visible environment variable docs in provided files; check wiki/documentation repos. Tournament mode (.idea/runConfigurations/Tournament.xml) has separate setup requirements not obvious from file listing.

🏗️Architecture

💡Concepts to learn

  • Ruleset Plugin Architecture — osu! supports 4+ game modes (Osu, Taiko, Catch, Mania) as pluggable rulesets rather than monolithic code; understanding this pattern is essential to extending the game with new modes
  • Beatmap Difficulty Calculation (Diffcalc) — Custom algorithm determines song difficulty ratings; runs in separate CI pipeline (.github/workflows/diffcalc.yml) and requires understanding of scoring algorithms, stream detection, and skill-based weighting
  • Replay System (Replays/) — Records and replays user inputs frame-by-frame for competitive verification and spectating; requires understanding of input buffering, replay serialization, and deterministic playback
  • Cross-Platform Abstraction (osu.Framework) — Single C# codebase targets Windows, macOS, Linux, iOS, Android via abstraction layer; critical for understanding platform-specific code paths and conditional compilation
  • WebSocket Multiplayer Protocol — Real-time synchronization of player actions in multiplayer lobbies; understanding latency compensation and input validation is critical for networked features
  • OpenGL/Vulkan Rendering Pipeline (GLSL) — Low-level graphics API abstraction for cross-platform rendering of circles, sliders, and effects; .glsl files present indicate shader-based rendering optimization
  • Deterministic Game State & Rewind — Replays and spectating require rewinding game state frame-by-frame without re-simulating; this architectural constraint affects how game logic handles state mutations
  • ppy/osu-framework — Core rendering and cross-platform abstraction layer used by osu! Desktop/Mobile; required dependency for game engine
  • ppy/osu-web — Official web interface and API backend that osu! client communicates with for user accounts, beatmap downloads, leaderboards
  • ppy/osu-resources — Shared game assets (skins, sounds, textures) and binary resources used across all osu! client platforms
  • StepMania/stepmania — Predecessor/alternative rhythm game engine with similar architecture for different game (arrows instead of circles); informs design patterns
  • beat-saber-modding-group/BeatSaber-IPA-Reloaded — Cross-platform rhythm game modding infrastructure; relevant for understanding plugin/ruleset extensibility patterns in games

🪄PR ideas

To work on one of these in Claude Code or Cursor, paste: Implement the "<title>" PR idea from CLAUDE.md, working through the checklist as the task list.

Add GitHub Actions workflow for ruleset template validation

The repo contains template rulesets in Templates/Rulesets/ruleset-empty/ but there's no CI workflow to validate that new ruleset templates compile and pass basic checks. This prevents template rot and ensures community contributors can reliably use templates. A new workflow similar to the existing ci.yml structure would validate template integrity on changes.

  • [ ] Create .github/workflows/ruleset-template-validation.yml that builds Templates/Rulesets/ruleset-empty/
  • [ ] Add validation to ensure template .csproj files reference correct osu base packages
  • [ ] Add step to run basic compile check on template projects with dotnet build
  • [ ] Document the new workflow in CONTRIBUTING.md

Create comprehensive CodeAnalysis rules documentation

The repo has CodeAnalysis/BannedSymbols.txt and CodeAnalysis/osu.globalconfig with code analysis rules, but there's no documented guide explaining WHY specific symbols are banned or what the global config rules enforce. This makes onboarding harder for new contributors who violate these rules without understanding the rationale.

  • [ ] Create CodeAnalysis/README.md documenting each banned symbol category with examples
  • [ ] Cross-reference osu.globalconfig rules and explain the architectural decisions behind them
  • [ ] Add links to this documentation from CONTRIBUTING.md's code style section
  • [ ] Include examples of common violations and how to fix them

Add unit tests for game ruleset registration and mod loading

The file structure shows 4 distinct ruleset test projects (.idea run configs for CatchRuleset__Tests_, ManiaRuleset__Tests_, OsuRuleset__Tests_, TaikoRuleset__Tests_) but there's no visible integration test validating that rulesets properly register themselves or that mod definitions load correctly from the web-mod-definitions workflow. This gap leaves cross-ruleset mod loading bugs undetected.

  • [ ] Create a new test project osu.Game.Tests/Rulesets/RulesetRegistrationTests.cs
  • [ ] Add tests verifying each ruleset can be discovered and instantiated via RulesetStore
  • [ ] Add tests validating mod definitions load correctly for each ruleset
  • [ ] Add CI step in .github/workflows/ci.yml to run this new test suite specifically

🌿Good first issues

  • Add missing unit tests for osu.Game/Beatmaps/ chart parsing: currently no dedicated test coverage visible for beatmap deserialization edge cases
  • Improve shader documentation: .glsl files present but no inline comments or .md explaining rendering pipeline; add GLSL reference guide for newcomers
  • Implement missing --help text for CLI tools in .config/dotnet-tools.json; currently no documented user-facing tool descriptions

Top contributors

Click to expand

📝Recent commits

Click to expand
  • 458a27c — Remove unused variable (peppy)
  • 397b220 — Fix missing uncommitted change (peppy)
  • 6f46be1 — Update framework (peppy)
  • aace7f9 — Enable stateful reconnects (#35658) (smoogipoo)
  • 08c02e2 — Fix song select scrolling performance when user has many beatmaps loaded (#37666) (peppy)
  • 0457cb9 — Don't consider user toggles for beatmap skin/samples when in editor (#37662) (peppy)
  • c74c54d — Fix sentry logger init failing for edge cases (#37673) (peppy)
  • 4d88c14 — Replace hit objects when placing at same time in editor (#37485) (Hiviexd)
  • 53f945b — Added "LN Ratio" display in Mania in the place of useless "key count" (#37581) (pacowoc)
  • e6fdd37 — Restore editor mode when changing difficulty (#37671) (peppy)

🔒Security observations

The osu! codebase shows generally good security practices with proper CI/CD automation and community involvement. However, there are notable concerns: (1) IDE configuration directories are committed to version control, potentially exposing development environment details; (2) No formal vulnerability disclosure policy (SECURITY.md) is documented; (3) Code ownership/review enforcement is not clearly established; (4) Dependency security cannot be fully assessed without visibility into package files. The main risks are informational leakage and lack of formalized security processes. No evidence of hardcoded secrets, SQL injection, XSS vulnerabilities, or infrastructure misconfigurations was found in the visible file structure. Recommend implementing standard security.md, CODEOWNERS files, and auditing committed sensitive files for removal from git history.

  • Medium · IDE Configuration Files Committed to Repository — .idea/, .vscode/. The .idea directory and .vscode configuration files are committed to version control. These may contain sensitive information such as local paths, credentials, or debugging configurations that could expose system information or development environment details. Fix: Add .idea/, .vscode/ to .gitignore and remove from git history using 'git rm --cached' followed by 'git filter-branch' or 'BFG Repo-Cleaner' to purge from commit history.
  • Low · Missing Security-Related Configuration Files — Repository root. No security.md or SECURITY.txt file was found in the repository root. This makes it unclear how security vulnerabilities should be reported, potentially leading to public disclosure of security issues. Fix: Create a SECURITY.md file following GitHub's standard format (https://docs.github.com/en/code-security/getting-started/adding-a-security-policy-to-your-repository) with instructions for responsible disclosure.
  • Low · No CODEOWNERS File — Repository root. The repository lacks a CODEOWNERS file, which means there's no enforced code review process for security-sensitive areas. This could allow unauthorized changes to critical components. Fix: Create a .github/CODEOWNERS file to enforce mandatory code review from designated security/maintainer team members for sensitive files.
  • Low · Incomplete Dependency Analysis — Package files (*.csproj, packages.config, Directory.Build.props). The provided dependency/package file content is empty. Without visibility into actual NuGet dependencies, transitive dependencies, or version pins, it's impossible to assess for known vulnerable packages. Fix: Review all NuGet package dependencies and ensure: 1) All packages are from official sources, 2) No outdated packages with known CVEs, 3) Use dependency scanning tools like OWASP Dependency-Check or NuGet Security Scanner.
  • Low · Potential Hardcoded Configuration in Workflow Files — .github/workflows/. GitHub Actions workflow files are present but content is not visible. Workflows commonly contain hardcoded secrets, API keys, or credentials that should be managed via GitHub Secrets. Fix: Audit all .github/workflows/.yml files to ensure: 1) No secrets are hardcoded, 2) All sensitive values use ${{ secrets. }} syntax, 3) Review GitHub Actions audit logs for unauthorized access.

LLM-derived; treat as a starting point, not a security audit.


Generated by RepoPilot. Verdict based on maintenance signals — see the live page for receipts. Re-run on a new commit to refresh.

Healthy signals · ppy/osu — RepoPilot