Upload any file or ZIP — get deep static analysis across 30+ languages.
Security, code quality, best practices & CWE/OWASP mapping — all in one report.
30+ languages & frameworks — all with deep rule coverage
Drop a file, ZIP archive, or paste code directly. We'll detect the language automatically.
read_repository)
Bitbucket — Enter as username:AppPassword (e.g. sanchaninfo:ATATT3x…). To create: bitbucket.org → avatar → Personal Settings → App passwords → Create app password → tick Repositories: Read (required!) → Create. Username = your workspace slug (visible in bitbucket.org URLs).
Comprehensive static analysis across security, quality, performance and style
Every review runs 8 analysis layers in parallel — language-specific reviewers, taint tracking, duplication detection, dependency CVE scanning and CWE/OWASP mapping. Same rule sets as SonarQube, Semgrep, Bandit, ESLint and GitHub Advanced Security.
| # | Layer | What It Covers | Rules |
|---|---|---|---|
| L1 | Language Reviewers | Java, Python, JavaScript, TypeScript, Go, React, Scala, Dart, R, Node.js Security | — |
| L2 | General / Universal | PII/GDPR (SSN, credit cards, emails), hardcoded secrets, license headers, TODO/FIXME audit, common anti-patterns across all languages | — |
| L3 | IaC & DevOps | Dockerfile, Terraform, CloudFormation, Ansible — secrets in config, privilege escalation, open ports, latest tags | — |
| L4 | Dependency / CVE | Checks package.json, requirements.txt, pom.xml, go.mod for known vulnerable packages, outdated major versions and license compliance | — |
| L5 | Taint Tracker | Tracks untrusted input (req.query, req.body, argv) flowing into sinks (DB queries, exec, eval, file ops) — catches injection at the data-flow level | — |
| L6 | Complexity / AST | Cyclomatic complexity, nesting depth, function length, class size — structural quality metrics computed from the abstract syntax tree | — |
| L7 | Duplication Detector | Token-hash-based clone detection — finds copy-paste blocks across files, near-duplicate functions, repeated logic that should be extracted | — |
| L8 | CWE / OWASP Mapper | Every issue automatically tagged with its CWE ID (e.g. CWE-89 SQL Injection) and OWASP Top 10 2021 category (e.g. A03:2021 Injection) | — |
| TOTAL | … | ||
Your recent code reviews
| File | Language | Score | Issues | Date | Actions |
|---|---|---|---|---|---|
| No reviews yet — upload your first file above | |||||