Skip to main content

Local-first CLI for auditing AI-generated code for common mistakes

Project description

driftcode-auditor

Local-first CLI for auditing code maintainability, privacy risks, and architecture drift.

License: MIT — Free to use, modify, and distribute.

Features

  • Automatically respects .gitignore and common build directories (.next, node_modules, dist, .git, etc.)
  • Parallel scanning for good performance on large codebases
  • Reports files scanned + time taken
  • --stream mode to print issues as they are discovered
  • --quiet and --verbose output modes
  • Customizable file extensions via --ext or config file
  • Configurable PII allowlist to reduce false positives
  • Pure local operation — no network calls

Configuration

  • Project-level: .driftcode.json in the scanned directory
  • User-level: ~/.config/driftcode/config.json

Usage

Basic scan (after installation):

driftcode-auditor --path /path/to/project --format md --privacy

Or run directly from source:

python -m driftcode_auditor --path /path/to/project --format md --privacy

Common options:

driftcode-auditor --path . --format md --privacy --maintainability
driftcode-auditor --path . --format json --privacy --stream
driftcode-auditor --path . --privacy --verbose
driftcode-auditor --path . --privacy --ext .py,.ts

Flags

Flag Description
--path Directory to scan (default: current dir)
--format Output format: md or json
--privacy Enable privacy risk detection
--maintainability Enable maintainability checks
--stream Print issues immediately as found
--output File for full detailed report (default: driftcode-report.md)
--quiet Minimal output
--verbose Show every file being scanned
--ext Comma-separated list of extensions to scan

Example Output

Scanning /home/user/project ... (skipping common build dirs)

# DriftCode Auditor Report
...

## Privacy
- **pii** in `lib/network.ts:42`: PII in code
- ... and 47 more

## Architecture
- **large_file** in `lib/commands.ts:1`: File >500 lines
- ... and 3 more

Scan complete.
Files scanned: 1247
Time taken: 3.21s
Total issues found: 87

When many issues are found, only the first 15 per category are shown, followed by a summary count.

Running Tests

python -m pytest tests/

License

This project is licensed under the MIT License - see the LICENSE file for details.

Support the Project

DriftCode Auditor is free and open source, and will remain that way.

If you find it valuable — especially when auditing AI-generated code — consider sponsoring its development on GitHub Sponsors.

Your support helps sustain focused work on the tool, funds new rule development, and keeps the project moving forward as AI coding practices evolve.

Every sponsor directly contributes to making reliable AI code review more accessible.

Philosophy

DriftCode Auditor is designed to help developers audit AI-generated code for common and obvious mistakes.

Key goals:

  • Catch simple issues that would otherwise go unnoticed
  • Be fast and respectful of existing project structure (respects .gitignore)
  • Stay simple, local-first, and privacy-conscious
  • Provide clear, actionable feedback without false security

All scanning happens on your machine with no data leaving your environment.

Reviewing AI-Generated Code

DriftCode Auditor is designed to help you quickly audit code produced by AI coding assistants (Claude, Cursor, Copilot, etc.).

Common Issues It Catches

  • Missing or fake error handling
  • Hardcoded secrets and credentials
  • Overly generic function names
  • Architectural drift and pattern violations
  • Missing edge case handling
  • Potential PII / secret leaks

Recommended Workflow

  1. Generate code with your AI assistant
  2. Run driftcode-auditor on the changed files
  3. Review flagged issues before committing
  4. Use --output report.md for a full detailed report

Example: Catching a Common AI Mistake

AI-generated code:

def get_user(user_id):
    return db.query("SELECT * FROM users WHERE id = " + user_id)

DriftCode Auditor output:

- **pii** in `user_service.py:12`: PII in code → `return db.query("SELECT * FROM users WHERE id = " + user_id)`
- **secret** in `user_service.py:12`: Potential SQL injection risk

This helps catch problems that are easy to miss in normal code review.

This adds a lightweight but effective safety net when working with AI-generated code.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

driftcode_auditor-0.2.0.tar.gz (12.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

driftcode_auditor-0.2.0-py3-none-any.whl (12.5 kB view details)

Uploaded Python 3

File details

Details for the file driftcode_auditor-0.2.0.tar.gz.

File metadata

  • Download URL: driftcode_auditor-0.2.0.tar.gz
  • Upload date:
  • Size: 12.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for driftcode_auditor-0.2.0.tar.gz
Algorithm Hash digest
SHA256 0a7f643d7f2e9f943b69fe135175ec73e3e917a834596c2a7a772eab3f370be7
MD5 a648472de968dc7f73a84e1e623c3016
BLAKE2b-256 306a7d8fc3bacc9a125ab46fdb388d9fdcc9f045fed458922fbaa36f0a2251ad

See more details on using hashes here.

File details

Details for the file driftcode_auditor-0.2.0-py3-none-any.whl.

File metadata

File hashes

Hashes for driftcode_auditor-0.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 b23d2dd168885a25c7cb775eb81313706dcba8e57c2363b81458407a642f744c
MD5 f75cb926d1e3ee698e60a50805ef2d8a
BLAKE2b-256 1ea3a458946c6d9a0231bb1fd3c255905f9814425bd94a146cf5713fb6e1adcf

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page