Name | ai-code-analyzer JSON |
Version |
1.0.1
JSON |
| download |
home_page | https://github.com/ai-code-analyzer/ai-code-analyzer |
Summary | AI-powered code analysis tool for CI/CD pipelines with GitHub Actions integration |
upload_time | 2025-07-12 14:07:53 |
maintainer | None |
docs_url | None |
author | AI Code Analysis Team |
requires_python | >=3.8 |
license | MIT License
Copyright (c) 2024 AI Code Analysis Team
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE. |
keywords |
ai
code-analysis
ci-cd
github-actions
testing
security
performance
|
VCS |
 |
bugtrack_url |
|
requirements |
No requirements were recorded.
|
Travis-CI |
No Travis.
|
coveralls test coverage |
No coveralls.
|
# ๐ค AI Code Analyzer
[](https://badge.fury.io/py/ai-code-analyzer)
[](https://pypi.org/project/ai-code-analyzer/)
[](https://opensource.org/licenses/MIT)
[](https://github.com/ai-code-analyzer/ai-code-analyzer/actions)
A comprehensive AI-powered code analysis package that integrates with CI/CD pipelines to analyze code commits, execute tests, perform load testing, and generate detailed release notes with risk assessments.
## ๐ Quick Start
### Installation
```bash
# Install from PyPI
pip install ai-code-analyzer
# Or install with all optional dependencies
pip install ai-code-analyzer[all]
```
### GitHub Action Usage
Add this to your `.github/workflows/ci.yml`:
```yaml
name: AI Code Analysis
on:
pull_request:
push:
branches: [main]
jobs:
analyze:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: ai-code-analyzer/ai-code-analyzer@v1
with:
github-token: ${{ secrets.GITHUB_TOKEN }}
openai-api-key: ${{ secrets.OPENAI_API_KEY }}
```
### Command Line Usage
```bash
# Initialize configuration
ai-code-analyzer init
# Analyze a commit
ai-code-analyzer analyze --commit HEAD
# Analyze a pull request
ai-code-analyzer analyze --pr 123
# Validate configuration
ai-code-analyzer validate
```
## ๐ Features
### Core Analysis Capabilities
- **Multi-language support**: Python, JavaScript/TypeScript, Java, Go, Rust, C/C++, Ruby, PHP, Swift, Kotlin, Scala
- **Static code analysis**: Security vulnerabilities, code quality, complexity metrics
- **Dynamic testing**: Unit tests, integration tests, end-to-end tests
- **Load testing**: Performance testing with Locust and Artillery
- **Security scanning**: Bandit, Safety, Semgrep, and custom security rules
- **AI-powered risk assessment**: Using OpenAI GPT-4 or Anthropic Claude
### CI/CD Integration
- **GitHub Actions**: Automated analysis on PR and push events
- **PR status updates**: Automatic comments and status checks
- **Risk-based deployment**: Blocks high-risk changes from merging
- **Release notes generation**: AI-generated release notes with metrics
### Advanced Features
- **Comprehensive reporting**: JSON, HTML, and Markdown outputs
- **Performance metrics**: Response times, throughput, failure rates
- **Test coverage analysis**: Multi-framework support with detailed reporting
- **Code quality scoring**: Weighted scoring system with customizable thresholds
- **Recommendation engine**: AI-powered suggestions for improvements
## ๐ฆ Package Features
- **Easy Installation**: Available on PyPI with simple `pip install`
- **GitHub Action**: Ready-to-use GitHub Action for seamless CI/CD integration
- **CLI Interface**: Rich command-line interface with beautiful output
- **Configuration Templates**: Pre-built configuration templates for different use cases
- **Extensible**: Modular architecture for easy customization and extension
## ๐ ๏ธ Installation Options
### Option 1: PyPI Package (Recommended)
```bash
# Basic installation
pip install ai-code-analyzer
# With development tools
pip install ai-code-analyzer[dev]
# With all optional dependencies
pip install ai-code-analyzer[all]
```
### Option 2: GitHub Action
Create `.github/workflows/ai-analysis.yml`:
```yaml
name: AI Code Analysis
on: [push, pull_request]
jobs:
analyze:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: ai-code-analyzer/ai-code-analyzer@v1
with:
github-token: ${{ secrets.GITHUB_TOKEN }}
openai-api-key: ${{ secrets.OPENAI_API_KEY }}
```
### Option 3: From Source
```bash
git clone https://github.com/ai-code-analyzer/ai-code-analyzer.git
cd ai-code-analyzer
pip install -e .
```
## โ๏ธ Quick Configuration
### Generate Configuration File
```bash
# Basic configuration
ai-code-analyzer init
# Advanced configuration
ai-code-analyzer init --template advanced
# Enterprise configuration
ai-code-analyzer init --template enterprise
```
### Set Environment Variables
```bash
export GITHUB_TOKEN="your-github-token"
export OPENAI_API_KEY="your-openai-api-key"
# OR
export ANTHROPIC_API_KEY="your-anthropic-api-key"
```
## ๐ฏ GitHub Action Inputs
| Input | Description | Required | Default |
|-------|-------------|----------|---------|
| `github-token` | GitHub token for API access | Yes | `${{ github.token }}` |
| `openai-api-key` | OpenAI API key for AI analysis | No | - |
| `anthropic-api-key` | Anthropic API key for AI analysis | No | - |
| `commit-hash` | Specific commit to analyze | No | Auto-detect |
| `pr-number` | PR number to analyze | No | Auto-detect |
| `config-file` | Configuration file path | No | `.ai-code-analyzer.yml` |
| `load-testing` | Enable load testing | No | `false` |
| `fail-on-high-risk` | Fail on high/critical risk | No | `true` |
## ๐ GitHub Action Outputs
| Output | Description |
|--------|-------------|
| `risk-level` | Overall risk level (low, medium, high, critical) |
| `risk-score` | Risk score (0-100) |
| `code-quality-score` | Code quality score (0-100) |
| `test-coverage` | Test coverage percentage |
| `security-issues` | Number of security issues |
| `performance-issues` | Number of performance issues |
| `analysis-results` | Path to detailed results file |
## ๐ง CLI Commands
### Analyze Code
```bash
# Analyze current commit
ai-code-analyzer analyze --commit HEAD
# Analyze specific commit
ai-code-analyzer analyze --commit abc123
# Analyze pull request
ai-code-analyzer analyze --pr 123
# Custom output file
ai-code-analyzer analyze --commit HEAD --output my-results.json
# Verbose output
ai-code-analyzer analyze --commit HEAD --verbose
```
### Configuration Management
```bash
# Initialize configuration
ai-code-analyzer init
# Validate configuration
ai-code-analyzer validate
# Validate specific config file
ai-code-analyzer validate --config my-config.yml
```
### Version Information
```bash
# Show version
ai-code-analyzer version
# Show help
ai-code-analyzer --help
```
## ๐ Prerequisites
- Python 3.8+
- Git
- GitHub token (for GitHub integration)
- OpenAI API key or Anthropic API key (for AI features)
- Node.js 16+ (optional, for JavaScript analysis)
- Go 1.19+ (optional, for Go analysis)
## ๐ Usage Examples
### Basic GitHub Action
```yaml
name: Code Analysis
on: [push, pull_request]
jobs:
analyze:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: ai-code-analyzer/ai-code-analyzer@v1
with:
github-token: ${{ secrets.GITHUB_TOKEN }}
openai-api-key: ${{ secrets.OPENAI_API_KEY }}
```
### Advanced GitHub Action with Load Testing
```yaml
name: Advanced Code Analysis
on: [push, pull_request]
jobs:
analyze:
runs-on: ubuntu-latest
services:
app:
image: my-app:latest
ports:
- 8000:8000
steps:
- uses: actions/checkout@v4
- uses: ai-code-analyzer/ai-code-analyzer@v1
with:
github-token: ${{ secrets.GITHUB_TOKEN }}
openai-api-key: ${{ secrets.OPENAI_API_KEY }}
load-testing: true
load-testing-host: http://localhost:8000
config-file: .ai-code-analyzer.yml
```
### Python Package Usage
```python
from ai_code_analyzer import CodeAnalysisTool
# Initialize the tool
tool = CodeAnalysisTool('config.yaml')
# Analyze a commit
results = await tool.analyze_commit('abc123')
# Analyze a PR
pr_results = await tool.analyze_pr(123)
```
### CLI Usage
```bash
# Initialize configuration
ai-code-analyzer init --template advanced
# Analyze current commit
ai-code-analyzer analyze --commit HEAD
# Analyze with custom config
ai-code-analyzer analyze --commit HEAD --config my-config.yml
# Validate configuration
ai-code-analyzer validate
```
## ๐ Configuration Examples
### Basic Configuration
```yaml
# .ai-code-analyzer.yml
repository:
path: "."
github:
token: "${GITHUB_TOKEN}"
owner: "${GITHUB_REPOSITORY_OWNER}"
repo: "${GITHUB_REPOSITORY_NAME}"
ai:
openai_api_key: "${OPENAI_API_KEY}"
risk_assessment:
thresholds:
low: 0
medium: 40
high: 60
critical: 80
```
### Advanced Configuration
```yaml
# .ai-code-analyzer.yml
repository:
path: "."
github:
token: "${GITHUB_TOKEN}"
owner: "${GITHUB_REPOSITORY_OWNER}"
repo: "${GITHUB_REPOSITORY_NAME}"
ai:
openai_api_key: "${OPENAI_API_KEY}"
anthropic_api_key: "${ANTHROPIC_API_KEY}"
load_testing:
enabled: true
host: "http://localhost:8000"
basic:
users: 10
duration: 60
analysis:
languages:
- python
- javascript
- java
- go
security:
enable_bandit: true
enable_safety: true
enable_semgrep: true
testing:
frameworks:
python: ["pytest"]
javascript: ["jest"]
coverage:
min_coverage: 80
risk_assessment:
weights:
security: 0.3
performance: 0.2
reliability: 0.25
maintainability: 0.15
testing: 0.1
thresholds:
low: 0
medium: 40
high: 60
critical: 80
```
## ๐ Example Workflows
### Workflow 1: Basic PR Analysis
```bash
# .github/workflows/pr-analysis.yml
name: PR Analysis
on:
pull_request:
types: [opened, synchronize]
jobs:
analyze:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: ai-code-analyzer/ai-code-analyzer@v1
with:
github-token: ${{ secrets.GITHUB_TOKEN }}
openai-api-key: ${{ secrets.OPENAI_API_KEY }}
fail-on-high-risk: true
```
### Workflow 2: Release Analysis
```yaml
# .github/workflows/release-analysis.yml
name: Release Analysis
on:
push:
branches: [main]
jobs:
analyze:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: ai-code-analyzer/ai-code-analyzer@v1
with:
github-token: ${{ secrets.GITHUB_TOKEN }}
openai-api-key: ${{ secrets.OPENAI_API_KEY }}
load-testing: true
fail-on-high-risk: false
- name: Create Release Notes
if: success()
run: |
# Use the generated release notes for creating releases
echo "Release notes generated in analysis results"
```
## ๐ Output Examples
### Risk Assessment Output
```json
{
"risk_assessment": {
"risk_level": "medium",
"risk_score": 45.7,
"confidence": 0.85,
"recommendations": [
"Address security vulnerabilities immediately",
"Increase test coverage to at least 80%",
"Optimize performance bottlenecks"
]
},
"analysis": {
"quality_score": 78.5,
"security_issues": 2,
"performance_issues": 1
},
"tests": {
"summary": {
"total_tests": 150,
"passed_tests": 145,
"coverage_percentage": 82.3
}
}
}
```
### CLI Output
```
๐ฏ Risk Assessment
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ Risk Level: MEDIUM โ
โ Risk Score: 45.7/100 โ
โ Confidence: 0.85 โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
๐ Analysis Metrics
โโโโโโโโโโโโโโโโโโโโโโโณโโโโโโโโโโโโโโโโโโโโโโ
โ Metric โ Value โ
โกโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโฉ
โ Code Quality Score โ 78.5/100 โ
โ Security Issues โ 2 โ
โ Performance Issues โ 1 โ
โ Test Coverage โ 82.3% โ
โ Tests Passed โ 145/150 โ
โโโโโโโโโโโโโโโโโโโโโโโดโโโโโโโโโโโโโโโโโโโโโโ
๐ก Top Recommendations:
1. Address security vulnerabilities immediately
2. Increase test coverage to at least 80%
3. Optimize performance bottlenecks
```
## ๐ง Development
### Setting Up Development Environment
```bash
# Clone the repository
git clone https://github.com/ai-code-analyzer/ai-code-analyzer.git
cd ai-code-analyzer
# Install in development mode
pip install -e .[dev]
# Run tests
pytest
# Run linting
black src/ tests/
isort src/ tests/
flake8 src/ tests/
```
### Building the Package
```bash
# Build the package
python -m build
# Check the package
twine check dist/*
# Upload to Test PyPI
twine upload --repository testpypi dist/*
```
## ๐ API Reference
### CodeAnalysisTool
```python
from ai_code_analyzer import CodeAnalysisTool
tool = CodeAnalysisTool(config_path="config.yaml")
# Analyze a commit
results = await tool.analyze_commit("abc123")
# Analyze a PR
pr_results = await tool.analyze_pr(123)
```
### Configuration
```python
from ai_code_analyzer import Config
config = Config("config.yaml")
value = config.get("github.token")
config.set("load_testing.enabled", True)
```
## ๐ Analysis Results
### Risk Assessment Levels
- **๐ข LOW (0-39)**: Safe to merge, minimal risk
- **๐ก MEDIUM (40-59)**: Proceed with caution, additional review recommended
- **๐ HIGH (60-79)**: Requires thorough review, consider additional testing
- **๐ด CRITICAL (80-100)**: DO NOT MERGE, critical issues must be resolved
### Output Format
The tool generates comprehensive results in JSON format:
```json
{
"commit_hash": "abc123",
"risk_assessment": {
"risk_level": "medium",
"risk_score": 45.7,
"confidence": 0.85,
"recommendations": [
"Address security vulnerabilities immediately",
"Increase test coverage to at least 80%"
]
},
"analysis": {
"quality_score": 78.5,
"security_issues": ["Potential SQL injection in auth.py"],
"performance_issues": ["Inefficient database query in search.py"]
},
"tests": {
"summary": {
"total_tests": 150,
"passed_tests": 145,
"failed_tests": 5,
"coverage_percentage": 82.3
}
},
"release_notes": "# Release Notes\n\n## Features\n- Added user authentication..."
}
```
## ๐ฏ Supported Test Frameworks
### Python
- pytest
- unittest
- nose2
### JavaScript/TypeScript
- Jest
- Mocha
- Cypress
- Playwright
### Java
- JUnit
- TestNG
- Maven
- Gradle
### Go
- go test
### Rust
- cargo test
## ๐ Security Analysis
### Static Analysis Tools
- **Bandit**: Python security linter
- **Safety**: Python dependency vulnerability scanner
- **Semgrep**: Multi-language static analysis
- **ESLint**: JavaScript/TypeScript security rules
- **Gosec**: Go security analyzer
### Security Checks
- Hardcoded secrets detection
- SQL injection patterns
- XSS vulnerability patterns
- Command injection detection
- Insecure cryptographic practices
## โก Performance Testing
### Load Testing Scenarios
- **Basic Load Test**: 10 users, 60 seconds
- **Spike Test**: 50 users, 30 seconds
- **Stress Test**: 100 users, 5 minutes
- **Endurance Test**: 20 users, 30 minutes
### Performance Metrics
- Average response time
- Requests per second
- Error rate
- Resource utilization
## ๐ค AI Integration
### OpenAI GPT-4
- Advanced code analysis
- Risk assessment
- Recommendation generation
- Release notes creation
### Anthropic Claude
- Alternative AI provider
- Advanced reasoning capabilities
- Code understanding
## ๐ง Customization
### Custom Risk Rules
Add custom rules to `config.yaml`:
```yaml
risk_assessment:
custom_rules:
- pattern: "eval\\s*\\("
severity: "critical"
message: "Use of eval() is dangerous"
- pattern: "TODO|FIXME"
severity: "medium"
message: "Unresolved TODO items"
```
### Custom Test Commands
```yaml
testing:
custom_commands:
python: ["python -m pytest --cov=src"]
javascript: ["npm test", "npm run test:integration"]
```
## ๐ API Documentation
### Core Classes
#### `CodeAnalyzer`
Performs static code analysis and quality checks.
#### `TestExecutor`
Executes tests and collects results.
#### `LoadTester`
Performs load testing using Locust and Artillery.
#### `AIRiskAssessment`
AI-powered risk assessment using OpenAI or Anthropic.
#### `ReleaseNotesGenerator`
Generates comprehensive release notes.
#### `GitHubIntegration`
Handles GitHub API integration.
## ๐จ Troubleshooting
### Common Issues
1. **Permission Denied**: Ensure GitHub token has required permissions
2. **API Rate Limits**: Implement rate limiting for AI API calls
3. **Memory Issues**: Increase memory limits for large repositories
4. **Network Timeouts**: Configure appropriate timeouts for external calls
### Debug Mode
Enable debug logging:
```bash
python src/main.py --verbose --commit HEAD
```
## ๐ค Contributing to the Package
1. Fork the repository
2. Create a feature branch
3. Make your changes
4. Add tests
5. Submit a pull request
### Development Guidelines
```bash
# Install in development mode
pip install -e .[dev]
# Run tests
pytest
# Format code
black src/ tests/
isort src/ tests/
# Type checking
mypy src/
# Linting
flake8 src/ tests/
```
## ๐ฆ Publishing
The package is automatically published to PyPI when a new release is created on GitHub.
### Manual Publishing
```bash
# Build the package
python -m build
# Upload to PyPI
twine upload dist/*
```
## ๐ Links
- **PyPI Package**: https://pypi.org/project/ai-code-analyzer/
- **GitHub Repository**: https://github.com/ai-code-analyzer/ai-code-analyzer
- **Documentation**: https://ai-code-analyzer.readthedocs.io/
- **GitHub Action**: https://github.com/marketplace/actions/ai-code-analyzer
- **Issue Tracker**: https://github.com/ai-code-analyzer/ai-code-analyzer/issues
## ๐ License
This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.
## ๐ Acknowledgments
- **OpenAI** for GPT-4 API
- **Anthropic** for Claude API
- **GitHub** for Actions and API
- **All open-source security and testing tools**
- **Python packaging community**
## ๐ Support
For support and questions:
1. Check the [Documentation](https://ai-code-analyzer.readthedocs.io/)
2. Search existing [Issues](https://github.com/ai-code-analyzer/ai-code-analyzer/issues)
3. Create a new issue with detailed information
4. Join our [Discord Community](https://discord.gg/ai-code-analyzer)
---
**Made with โค๏ธ by the AI Code Analysis Team**
[](https://pypi.org/project/ai-code-analyzer/)
[](https://pepy.tech/project/ai-code-analyzer)
[](https://github.com/ai-code-analyzer/ai-code-analyzer/stargazers)
Raw data
{
"_id": null,
"home_page": "https://github.com/ai-code-analyzer/ai-code-analyzer",
"name": "ai-code-analyzer",
"maintainer": null,
"docs_url": null,
"requires_python": ">=3.8",
"maintainer_email": "AI Code Analysis Team <team@ai-code-analyzer.com>",
"keywords": "ai, code-analysis, ci-cd, github-actions, testing, security, performance",
"author": "AI Code Analysis Team",
"author_email": "AI Code Analysis Team <team@ai-code-analyzer.com>",
"download_url": "https://files.pythonhosted.org/packages/d1/b5/83dd573da19f9d9cd5767f9efc682c11fe180600f677d80ba23239408b5c/ai_code_analyzer-1.0.1.tar.gz",
"platform": null,
"description": "# \ud83e\udd16 AI Code Analyzer\n\n[](https://badge.fury.io/py/ai-code-analyzer)\n[](https://pypi.org/project/ai-code-analyzer/)\n[](https://opensource.org/licenses/MIT)\n[](https://github.com/ai-code-analyzer/ai-code-analyzer/actions)\n\nA comprehensive AI-powered code analysis package that integrates with CI/CD pipelines to analyze code commits, execute tests, perform load testing, and generate detailed release notes with risk assessments.\n\n## \ud83d\ude80 Quick Start\n\n### Installation\n\n```bash\n# Install from PyPI\npip install ai-code-analyzer\n\n# Or install with all optional dependencies\npip install ai-code-analyzer[all]\n```\n\n### GitHub Action Usage\n\nAdd this to your `.github/workflows/ci.yml`:\n\n```yaml\nname: AI Code Analysis\n\non:\n pull_request:\n push:\n branches: [main]\n\njobs:\n analyze:\n runs-on: ubuntu-latest\n steps:\n - uses: actions/checkout@v4\n - uses: ai-code-analyzer/ai-code-analyzer@v1\n with:\n github-token: ${{ secrets.GITHUB_TOKEN }}\n openai-api-key: ${{ secrets.OPENAI_API_KEY }}\n```\n\n### Command Line Usage\n\n```bash\n# Initialize configuration\nai-code-analyzer init\n\n# Analyze a commit\nai-code-analyzer analyze --commit HEAD\n\n# Analyze a pull request\nai-code-analyzer analyze --pr 123\n\n# Validate configuration\nai-code-analyzer validate\n```\n\n## \ud83d\ude80 Features\n\n### Core Analysis Capabilities\n- **Multi-language support**: Python, JavaScript/TypeScript, Java, Go, Rust, C/C++, Ruby, PHP, Swift, Kotlin, Scala\n- **Static code analysis**: Security vulnerabilities, code quality, complexity metrics\n- **Dynamic testing**: Unit tests, integration tests, end-to-end tests\n- **Load testing**: Performance testing with Locust and Artillery\n- **Security scanning**: Bandit, Safety, Semgrep, and custom security rules\n- **AI-powered risk assessment**: Using OpenAI GPT-4 or Anthropic Claude\n\n### CI/CD Integration\n- **GitHub Actions**: Automated analysis on PR and push events\n- **PR status updates**: Automatic comments and status checks\n- **Risk-based deployment**: Blocks high-risk changes from merging\n- **Release notes generation**: AI-generated release notes with metrics\n\n### Advanced Features\n- **Comprehensive reporting**: JSON, HTML, and Markdown outputs\n- **Performance metrics**: Response times, throughput, failure rates\n- **Test coverage analysis**: Multi-framework support with detailed reporting\n- **Code quality scoring**: Weighted scoring system with customizable thresholds\n- **Recommendation engine**: AI-powered suggestions for improvements\n\n## \ud83d\udce6 Package Features\n\n- **Easy Installation**: Available on PyPI with simple `pip install`\n- **GitHub Action**: Ready-to-use GitHub Action for seamless CI/CD integration\n- **CLI Interface**: Rich command-line interface with beautiful output\n- **Configuration Templates**: Pre-built configuration templates for different use cases\n- **Extensible**: Modular architecture for easy customization and extension\n\n## \ud83d\udee0\ufe0f Installation Options\n\n### Option 1: PyPI Package (Recommended)\n\n```bash\n# Basic installation\npip install ai-code-analyzer\n\n# With development tools\npip install ai-code-analyzer[dev]\n\n# With all optional dependencies\npip install ai-code-analyzer[all]\n```\n\n### Option 2: GitHub Action\n\nCreate `.github/workflows/ai-analysis.yml`:\n\n```yaml\nname: AI Code Analysis\n\non: [push, pull_request]\n\njobs:\n analyze:\n runs-on: ubuntu-latest\n steps:\n - uses: actions/checkout@v4\n - uses: ai-code-analyzer/ai-code-analyzer@v1\n with:\n github-token: ${{ secrets.GITHUB_TOKEN }}\n openai-api-key: ${{ secrets.OPENAI_API_KEY }}\n```\n\n### Option 3: From Source\n\n```bash\ngit clone https://github.com/ai-code-analyzer/ai-code-analyzer.git\ncd ai-code-analyzer\npip install -e .\n```\n\n## \u2699\ufe0f Quick Configuration\n\n### Generate Configuration File\n\n```bash\n# Basic configuration\nai-code-analyzer init\n\n# Advanced configuration\nai-code-analyzer init --template advanced\n\n# Enterprise configuration\nai-code-analyzer init --template enterprise\n```\n\n### Set Environment Variables\n\n```bash\nexport GITHUB_TOKEN=\"your-github-token\"\nexport OPENAI_API_KEY=\"your-openai-api-key\"\n# OR\nexport ANTHROPIC_API_KEY=\"your-anthropic-api-key\"\n```\n\n## \ud83c\udfaf GitHub Action Inputs\n\n| Input | Description | Required | Default |\n|-------|-------------|----------|---------|\n| `github-token` | GitHub token for API access | Yes | `${{ github.token }}` |\n| `openai-api-key` | OpenAI API key for AI analysis | No | - |\n| `anthropic-api-key` | Anthropic API key for AI analysis | No | - |\n| `commit-hash` | Specific commit to analyze | No | Auto-detect |\n| `pr-number` | PR number to analyze | No | Auto-detect |\n| `config-file` | Configuration file path | No | `.ai-code-analyzer.yml` |\n| `load-testing` | Enable load testing | No | `false` |\n| `fail-on-high-risk` | Fail on high/critical risk | No | `true` |\n\n## \ud83d\udcca GitHub Action Outputs\n\n| Output | Description |\n|--------|-------------|\n| `risk-level` | Overall risk level (low, medium, high, critical) |\n| `risk-score` | Risk score (0-100) |\n| `code-quality-score` | Code quality score (0-100) |\n| `test-coverage` | Test coverage percentage |\n| `security-issues` | Number of security issues |\n| `performance-issues` | Number of performance issues |\n| `analysis-results` | Path to detailed results file |\n\n## \ud83d\udd27 CLI Commands\n\n### Analyze Code\n\n```bash\n# Analyze current commit\nai-code-analyzer analyze --commit HEAD\n\n# Analyze specific commit\nai-code-analyzer analyze --commit abc123\n\n# Analyze pull request\nai-code-analyzer analyze --pr 123\n\n# Custom output file\nai-code-analyzer analyze --commit HEAD --output my-results.json\n\n# Verbose output\nai-code-analyzer analyze --commit HEAD --verbose\n```\n\n### Configuration Management\n\n```bash\n# Initialize configuration\nai-code-analyzer init\n\n# Validate configuration\nai-code-analyzer validate\n\n# Validate specific config file\nai-code-analyzer validate --config my-config.yml\n```\n\n### Version Information\n\n```bash\n# Show version\nai-code-analyzer version\n\n# Show help\nai-code-analyzer --help\n```\n\n## \ud83d\udccb Prerequisites\n\n- Python 3.8+\n- Git\n- GitHub token (for GitHub integration)\n- OpenAI API key or Anthropic API key (for AI features)\n- Node.js 16+ (optional, for JavaScript analysis)\n- Go 1.19+ (optional, for Go analysis)\n\n## \ud83d\ude80 Usage Examples\n\n### Basic GitHub Action\n\n```yaml\nname: Code Analysis\n\non: [push, pull_request]\n\njobs:\n analyze:\n runs-on: ubuntu-latest\n steps:\n - uses: actions/checkout@v4\n - uses: ai-code-analyzer/ai-code-analyzer@v1\n with:\n github-token: ${{ secrets.GITHUB_TOKEN }}\n openai-api-key: ${{ secrets.OPENAI_API_KEY }}\n```\n\n### Advanced GitHub Action with Load Testing\n\n```yaml\nname: Advanced Code Analysis\n\non: [push, pull_request]\n\njobs:\n analyze:\n runs-on: ubuntu-latest\n services:\n app:\n image: my-app:latest\n ports:\n - 8000:8000\n \n steps:\n - uses: actions/checkout@v4\n - uses: ai-code-analyzer/ai-code-analyzer@v1\n with:\n github-token: ${{ secrets.GITHUB_TOKEN }}\n openai-api-key: ${{ secrets.OPENAI_API_KEY }}\n load-testing: true\n load-testing-host: http://localhost:8000\n config-file: .ai-code-analyzer.yml\n```\n\n### Python Package Usage\n\n```python\nfrom ai_code_analyzer import CodeAnalysisTool\n\n# Initialize the tool\ntool = CodeAnalysisTool('config.yaml')\n\n# Analyze a commit\nresults = await tool.analyze_commit('abc123')\n\n# Analyze a PR\npr_results = await tool.analyze_pr(123)\n```\n\n### CLI Usage\n\n```bash\n# Initialize configuration\nai-code-analyzer init --template advanced\n\n# Analyze current commit\nai-code-analyzer analyze --commit HEAD\n\n# Analyze with custom config\nai-code-analyzer analyze --commit HEAD --config my-config.yml\n\n# Validate configuration\nai-code-analyzer validate\n```\n\n## \ud83d\udcc1 Configuration Examples\n\n### Basic Configuration\n\n```yaml\n# .ai-code-analyzer.yml\nrepository:\n path: \".\"\n\ngithub:\n token: \"${GITHUB_TOKEN}\"\n owner: \"${GITHUB_REPOSITORY_OWNER}\"\n repo: \"${GITHUB_REPOSITORY_NAME}\"\n\nai:\n openai_api_key: \"${OPENAI_API_KEY}\"\n\nrisk_assessment:\n thresholds:\n low: 0\n medium: 40\n high: 60\n critical: 80\n```\n\n### Advanced Configuration\n\n```yaml\n# .ai-code-analyzer.yml\nrepository:\n path: \".\"\n\ngithub:\n token: \"${GITHUB_TOKEN}\"\n owner: \"${GITHUB_REPOSITORY_OWNER}\"\n repo: \"${GITHUB_REPOSITORY_NAME}\"\n\nai:\n openai_api_key: \"${OPENAI_API_KEY}\"\n anthropic_api_key: \"${ANTHROPIC_API_KEY}\"\n\nload_testing:\n enabled: true\n host: \"http://localhost:8000\"\n basic:\n users: 10\n duration: 60\n\nanalysis:\n languages:\n - python\n - javascript\n - java\n - go\n \n security:\n enable_bandit: true\n enable_safety: true\n enable_semgrep: true\n\ntesting:\n frameworks:\n python: [\"pytest\"]\n javascript: [\"jest\"]\n \n coverage:\n min_coverage: 80\n\nrisk_assessment:\n weights:\n security: 0.3\n performance: 0.2\n reliability: 0.25\n maintainability: 0.15\n testing: 0.1\n \n thresholds:\n low: 0\n medium: 40\n high: 60\n critical: 80\n```\n\n## \ud83d\udd0d Example Workflows\n\n### Workflow 1: Basic PR Analysis\n\n```bash\n# .github/workflows/pr-analysis.yml\nname: PR Analysis\n\non:\n pull_request:\n types: [opened, synchronize]\n\njobs:\n analyze:\n runs-on: ubuntu-latest\n steps:\n - uses: actions/checkout@v4\n - uses: ai-code-analyzer/ai-code-analyzer@v1\n with:\n github-token: ${{ secrets.GITHUB_TOKEN }}\n openai-api-key: ${{ secrets.OPENAI_API_KEY }}\n fail-on-high-risk: true\n```\n\n### Workflow 2: Release Analysis\n\n```yaml\n# .github/workflows/release-analysis.yml\nname: Release Analysis\n\non:\n push:\n branches: [main]\n\njobs:\n analyze:\n runs-on: ubuntu-latest\n steps:\n - uses: actions/checkout@v4\n - uses: ai-code-analyzer/ai-code-analyzer@v1\n with:\n github-token: ${{ secrets.GITHUB_TOKEN }}\n openai-api-key: ${{ secrets.OPENAI_API_KEY }}\n load-testing: true\n fail-on-high-risk: false\n \n - name: Create Release Notes\n if: success()\n run: |\n # Use the generated release notes for creating releases\n echo \"Release notes generated in analysis results\"\n```\n\n## \ud83d\udcca Output Examples\n\n### Risk Assessment Output\n\n```json\n{\n \"risk_assessment\": {\n \"risk_level\": \"medium\",\n \"risk_score\": 45.7,\n \"confidence\": 0.85,\n \"recommendations\": [\n \"Address security vulnerabilities immediately\",\n \"Increase test coverage to at least 80%\",\n \"Optimize performance bottlenecks\"\n ]\n },\n \"analysis\": {\n \"quality_score\": 78.5,\n \"security_issues\": 2,\n \"performance_issues\": 1\n },\n \"tests\": {\n \"summary\": {\n \"total_tests\": 150,\n \"passed_tests\": 145,\n \"coverage_percentage\": 82.3\n }\n }\n}\n```\n\n### CLI Output\n\n```\n\ud83c\udfaf Risk Assessment\n\u250c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2510\n\u2502 Risk Level: MEDIUM \u2502\n\u2502 Risk Score: 45.7/100 \u2502\n\u2502 Confidence: 0.85 \u2502\n\u2514\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2518\n\n\ud83d\udcca Analysis Metrics\n\u250f\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2533\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2513\n\u2503 Metric \u2503 Value \u2503\n\u2521\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2547\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2501\u2529\n\u2502 Code Quality Score \u2502 78.5/100 \u2502\n\u2502 Security Issues \u2502 2 \u2502\n\u2502 Performance Issues \u2502 1 \u2502\n\u2502 Test Coverage \u2502 82.3% \u2502\n\u2502 Tests Passed \u2502 145/150 \u2502\n\u2514\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2534\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2518\n\n\ud83d\udca1 Top Recommendations:\n 1. Address security vulnerabilities immediately\n 2. Increase test coverage to at least 80%\n 3. Optimize performance bottlenecks\n```\n\n## \ud83d\udd27 Development\n\n### Setting Up Development Environment\n\n```bash\n# Clone the repository\ngit clone https://github.com/ai-code-analyzer/ai-code-analyzer.git\ncd ai-code-analyzer\n\n# Install in development mode\npip install -e .[dev]\n\n# Run tests\npytest\n\n# Run linting\nblack src/ tests/\nisort src/ tests/\nflake8 src/ tests/\n```\n\n### Building the Package\n\n```bash\n# Build the package\npython -m build\n\n# Check the package\ntwine check dist/*\n\n# Upload to Test PyPI\ntwine upload --repository testpypi dist/*\n```\n\n## \ud83d\udcda API Reference\n\n### CodeAnalysisTool\n\n```python\nfrom ai_code_analyzer import CodeAnalysisTool\n\ntool = CodeAnalysisTool(config_path=\"config.yaml\")\n\n# Analyze a commit\nresults = await tool.analyze_commit(\"abc123\")\n\n# Analyze a PR\npr_results = await tool.analyze_pr(123)\n```\n\n### Configuration\n\n```python\nfrom ai_code_analyzer import Config\n\nconfig = Config(\"config.yaml\")\nvalue = config.get(\"github.token\")\nconfig.set(\"load_testing.enabled\", True)\n```\n\n## \ud83d\udcca Analysis Results\n\n### Risk Assessment Levels\n\n- **\ud83d\udfe2 LOW (0-39)**: Safe to merge, minimal risk\n- **\ud83d\udfe1 MEDIUM (40-59)**: Proceed with caution, additional review recommended\n- **\ud83d\udfe0 HIGH (60-79)**: Requires thorough review, consider additional testing\n- **\ud83d\udd34 CRITICAL (80-100)**: DO NOT MERGE, critical issues must be resolved\n\n### Output Format\n\nThe tool generates comprehensive results in JSON format:\n\n```json\n{\n \"commit_hash\": \"abc123\",\n \"risk_assessment\": {\n \"risk_level\": \"medium\",\n \"risk_score\": 45.7,\n \"confidence\": 0.85,\n \"recommendations\": [\n \"Address security vulnerabilities immediately\",\n \"Increase test coverage to at least 80%\"\n ]\n },\n \"analysis\": {\n \"quality_score\": 78.5,\n \"security_issues\": [\"Potential SQL injection in auth.py\"],\n \"performance_issues\": [\"Inefficient database query in search.py\"]\n },\n \"tests\": {\n \"summary\": {\n \"total_tests\": 150,\n \"passed_tests\": 145,\n \"failed_tests\": 5,\n \"coverage_percentage\": 82.3\n }\n },\n \"release_notes\": \"# Release Notes\\n\\n## Features\\n- Added user authentication...\"\n}\n```\n\n## \ud83c\udfaf Supported Test Frameworks\n\n### Python\n- pytest\n- unittest\n- nose2\n\n### JavaScript/TypeScript\n- Jest\n- Mocha\n- Cypress\n- Playwright\n\n### Java\n- JUnit\n- TestNG\n- Maven\n- Gradle\n\n### Go\n- go test\n\n### Rust\n- cargo test\n\n## \ud83d\udd0d Security Analysis\n\n### Static Analysis Tools\n- **Bandit**: Python security linter\n- **Safety**: Python dependency vulnerability scanner\n- **Semgrep**: Multi-language static analysis\n- **ESLint**: JavaScript/TypeScript security rules\n- **Gosec**: Go security analyzer\n\n### Security Checks\n- Hardcoded secrets detection\n- SQL injection patterns\n- XSS vulnerability patterns\n- Command injection detection\n- Insecure cryptographic practices\n\n## \u26a1 Performance Testing\n\n### Load Testing Scenarios\n- **Basic Load Test**: 10 users, 60 seconds\n- **Spike Test**: 50 users, 30 seconds\n- **Stress Test**: 100 users, 5 minutes\n- **Endurance Test**: 20 users, 30 minutes\n\n### Performance Metrics\n- Average response time\n- Requests per second\n- Error rate\n- Resource utilization\n\n## \ud83e\udd16 AI Integration\n\n### OpenAI GPT-4\n- Advanced code analysis\n- Risk assessment\n- Recommendation generation\n- Release notes creation\n\n### Anthropic Claude\n- Alternative AI provider\n- Advanced reasoning capabilities\n- Code understanding\n\n## \ud83d\udd27 Customization\n\n### Custom Risk Rules\n\nAdd custom rules to `config.yaml`:\n\n```yaml\nrisk_assessment:\n custom_rules:\n - pattern: \"eval\\\\s*\\\\(\"\n severity: \"critical\"\n message: \"Use of eval() is dangerous\"\n - pattern: \"TODO|FIXME\"\n severity: \"medium\"\n message: \"Unresolved TODO items\"\n```\n\n### Custom Test Commands\n\n```yaml\ntesting:\n custom_commands:\n python: [\"python -m pytest --cov=src\"]\n javascript: [\"npm test\", \"npm run test:integration\"]\n```\n\n## \ud83d\udcda API Documentation\n\n### Core Classes\n\n#### `CodeAnalyzer`\nPerforms static code analysis and quality checks.\n\n#### `TestExecutor`\nExecutes tests and collects results.\n\n#### `LoadTester`\nPerforms load testing using Locust and Artillery.\n\n#### `AIRiskAssessment`\nAI-powered risk assessment using OpenAI or Anthropic.\n\n#### `ReleaseNotesGenerator`\nGenerates comprehensive release notes.\n\n#### `GitHubIntegration`\nHandles GitHub API integration.\n\n## \ud83d\udea8 Troubleshooting\n\n### Common Issues\n\n1. **Permission Denied**: Ensure GitHub token has required permissions\n2. **API Rate Limits**: Implement rate limiting for AI API calls\n3. **Memory Issues**: Increase memory limits for large repositories\n4. **Network Timeouts**: Configure appropriate timeouts for external calls\n\n### Debug Mode\n\nEnable debug logging:\n\n```bash\npython src/main.py --verbose --commit HEAD\n```\n\n## \ud83e\udd1d Contributing to the Package\n\n1. Fork the repository\n2. Create a feature branch\n3. Make your changes\n4. Add tests\n5. Submit a pull request\n\n### Development Guidelines\n\n```bash\n# Install in development mode\npip install -e .[dev]\n\n# Run tests\npytest\n\n# Format code\nblack src/ tests/\nisort src/ tests/\n\n# Type checking\nmypy src/\n\n# Linting\nflake8 src/ tests/\n```\n\n## \ud83d\udce6 Publishing\n\nThe package is automatically published to PyPI when a new release is created on GitHub.\n\n### Manual Publishing\n\n```bash\n# Build the package\npython -m build\n\n# Upload to PyPI\ntwine upload dist/*\n```\n\n## \ud83d\udd17 Links\n\n- **PyPI Package**: https://pypi.org/project/ai-code-analyzer/\n- **GitHub Repository**: https://github.com/ai-code-analyzer/ai-code-analyzer\n- **Documentation**: https://ai-code-analyzer.readthedocs.io/\n- **GitHub Action**: https://github.com/marketplace/actions/ai-code-analyzer\n- **Issue Tracker**: https://github.com/ai-code-analyzer/ai-code-analyzer/issues\n\n## \ud83d\udcc4 License\n\nThis project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.\n\n## \ud83d\ude4f Acknowledgments\n\n- **OpenAI** for GPT-4 API\n- **Anthropic** for Claude API \n- **GitHub** for Actions and API\n- **All open-source security and testing tools**\n- **Python packaging community**\n\n## \ud83d\udcde Support\n\nFor support and questions:\n\n1. Check the [Documentation](https://ai-code-analyzer.readthedocs.io/)\n2. Search existing [Issues](https://github.com/ai-code-analyzer/ai-code-analyzer/issues)\n3. Create a new issue with detailed information\n4. Join our [Discord Community](https://discord.gg/ai-code-analyzer)\n\n---\n\n**Made with \u2764\ufe0f by the AI Code Analysis Team**\n\n[](https://pypi.org/project/ai-code-analyzer/)\n[](https://pepy.tech/project/ai-code-analyzer)\n[](https://github.com/ai-code-analyzer/ai-code-analyzer/stargazers)\n",
"bugtrack_url": null,
"license": "MIT License\n \n Copyright (c) 2024 AI Code Analysis Team\n \n Permission is hereby granted, free of charge, to any person obtaining a copy\n of this software and associated documentation files (the \"Software\"), to deal\n in the Software without restriction, including without limitation the rights\n to use, copy, modify, merge, publish, distribute, sublicense, and/or sell\n copies of the Software, and to permit persons to whom the Software is\n furnished to do so, subject to the following conditions:\n \n The above copyright notice and this permission notice shall be included in all\n copies or substantial portions of the Software.\n \n THE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\n IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\n FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\n AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\n LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\n OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE\n SOFTWARE.",
"summary": "AI-powered code analysis tool for CI/CD pipelines with GitHub Actions integration",
"version": "1.0.1",
"project_urls": {
"Bug Tracker": "https://github.com/ai-code-analyzer/ai-code-analyzer/issues",
"Changelog": "https://github.com/ai-code-analyzer/ai-code-analyzer/blob/main/CHANGELOG.md",
"Documentation": "https://ai-code-analyzer.readthedocs.io/",
"Homepage": "https://github.com/ai-code-analyzer/ai-code-analyzer",
"Repository": "https://github.com/ai-code-analyzer/ai-code-analyzer"
},
"split_keywords": [
"ai",
" code-analysis",
" ci-cd",
" github-actions",
" testing",
" security",
" performance"
],
"urls": [
{
"comment_text": null,
"digests": {
"blake2b_256": "372962332ff63e6f9d6a5faa5b492782cec166148b03ec32977ab242c66a1c7c",
"md5": "a826e9fbbe7d5de9fe53ba82ab216a91",
"sha256": "ca0441caa1146c608dc3139fad6846f4374fd666ae6bebc87643f4094d5d5703"
},
"downloads": -1,
"filename": "ai_code_analyzer-1.0.1-py3-none-any.whl",
"has_sig": false,
"md5_digest": "a826e9fbbe7d5de9fe53ba82ab216a91",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.8",
"size": 37814,
"upload_time": "2025-07-12T14:07:52",
"upload_time_iso_8601": "2025-07-12T14:07:52.256424Z",
"url": "https://files.pythonhosted.org/packages/37/29/62332ff63e6f9d6a5faa5b492782cec166148b03ec32977ab242c66a1c7c/ai_code_analyzer-1.0.1-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": null,
"digests": {
"blake2b_256": "d1b583dd573da19f9d9cd5767f9efc682c11fe180600f677d80ba23239408b5c",
"md5": "1cbf98532cb262b0f9bf57b14906e2c8",
"sha256": "604578db1250dec10b56a291e04557af971b514853ee99be3e87d8e297d1239c"
},
"downloads": -1,
"filename": "ai_code_analyzer-1.0.1.tar.gz",
"has_sig": false,
"md5_digest": "1cbf98532cb262b0f9bf57b14906e2c8",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.8",
"size": 44448,
"upload_time": "2025-07-12T14:07:53",
"upload_time_iso_8601": "2025-07-12T14:07:53.768009Z",
"url": "https://files.pythonhosted.org/packages/d1/b5/83dd573da19f9d9cd5767f9efc682c11fe180600f677d80ba23239408b5c/ai_code_analyzer-1.0.1.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2025-07-12 14:07:53",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "ai-code-analyzer",
"github_project": "ai-code-analyzer",
"github_not_found": true,
"lcname": "ai-code-analyzer"
}