Skip to main content

A professional static analysis tool for QGIS (PyQGIS) plugins

Project description

QGIS Plugin Analyzer ๐Ÿ›ก๏ธ

๐Ÿ‘‰ View Full Rules Catalog (RULES.md)

GitHub release (latest by date) PyPI version PyPI downloads Python Version License GitHub stars GitHub forks Maintenance Conventional Commits

Quality Metrics:

Module Stability Maintainability Security Score Type Coverage Docstring Coverage Tests

The QGIS Plugin Analyzer is a static analysis tool designed specifically for QGIS (PyQGIS) plugin developers. Its goal is to elevate plugin quality by ensuring they follow community best practices and are optimized for AI-assisted development.

โœจ Main Features

  • Quality Blindage: Comprehensive test suite with 76% global coverage and >95% on core AST visitors.
  • Gen 5 Architecture: Modernized agentic system with English-based workflows and specialized skill modules for maximum precision.
  • Scaffold System: Integrated blueprints for standardizing QGIS and mining plugin generation.
  • Security Core (Bandit-inspired): Professional vulnerability scanning detecting eval, exec, shell injections, and SQL injection risks.
  • Deep Entropy Secret Scanner: Detects hardcoded API keys, passwords, and sensitive tokens using regex and information entropy.
  • High-Performance Engine: Parallel analysis powered by ProcessPoolExecutor with single-pass AST traversal and shared worker context.
  • Project Auto-Detection: Intelligently distinguishes between official QGIS Plugins and Generic Python Projects, tailoring validation logic accordingly.
  • Advanced Ignore Engine: Robust .analyzerignore support with non-anchored patterns and smart default excludes (.venv, build, etc.).
  • Deep Semantic Analysis: Cross-file dependency graphing (Mermaid), circular import detection, and module coupling metrics.
  • Interactive Auto-Fix Mode: Automatically fix common QGIS issues (GDAL imports, PyQt bridge, logging, i18n) with safety checks.
  • Official Repository Compliance: Proactive validation of binaries, package size, and metadata URLs.
  • Real-time Progress: CLI feedback with a progress bar and ETA tracking.
  • Enhanced Configuration Profiles: Rule-level severity control (error, warning, info, ignore) via pyproject.toml.
  • Integrated Ruff Analysis: Combines custom QGIS rules with the fastest linter in the Python ecosystem.
  • Qt Resource Validation: Detect missing or broken resource paths (:/plugins/...) in your code.
  • Extended Safety Audit: Detection of signal leaks, missing slots, and UI-blocking loops (QgsTask suggestions).
  • Embedded Web Server: View reports instantly with the built-in serve command.
  • AI-Ready: Generates structured summaries and optimized contexts for LLMs.
  • Zero Runtime Dependencies: Works using only the Python standard library (Ruff as an external tool).

๐Ÿ†• What's New in v1.13.1

Metadata Synchronization - Consistency fix for distribution artifacts.

From v1.13.0:

  • ๐Ÿ›ก๏ธ Test Coverage Blindage - Reached 76% global coverage. Core AST visitors and utility modules are now secured with >95% coverage.
  • ๐Ÿ—๏ธ Architectural Refactor - Decoupled ScoringEngine and ResultAggregator for better modularity.
  • ๐Ÿค– English Standardization - Entire developer framework translated and adapted for a generic Python package lifecycle.
  • ๐Ÿ“ˆ Accurate Scoring - Fixed maintainability calculation bug (~77/100).

๐Ÿ“– Full Release Notes | ๐Ÿ—บ๏ธ CLI Commands Roadmap

โš–๏ธ Why use this Analyzer? (Comparison)

Feature QGIS Plugin Analyzer flake8-qgis Ruff (Standard) Official Repo Bot
Run Locally / Offline โœ… (Your Machine) โœ… โœ… โŒ (Upload Only)
Static Linting โœ… (Ruff + Custom) โœ… (flake8) โœ… (General) โœ… (Limited)
QGIS-Specific Rules โœ… (Precise AST) โœ… (Regex/AST) โŒ โœ…
Interactive Auto-Fix โœ… โŒ โŒ โŒ
Semantic Analysis โœ… โŒ โŒ โŒ
Security Audit โœ… (Bandit-style) โŒ โŒ โœ… (Server-side)
Secret Scanning โœ… (Entropy) โŒ โŒ โœ… (Server-side)
HTML/MD Reports โœ… โŒ โŒ โŒ
AI Context Gen โœ… (Project Brain) โŒ โŒ โŒ

Key Differentiators

  1. Shift Left (Run Locally): The biggest advantage is being able to run the same high-standard checks as the Official Repository before you upload your plugin. No more "reject-fix-upload" loops.
  2. High-Performance Hybrid Engine: Combines multi-core AST processing with deep understanding of cross-file relationships and Qt-specific patterns.
  3. Safety-First Auto-Fixing: AST-based transformations with Git status verification and interactive diff previews.
  4. Zero Runtime Stack: Minimal footprint, ultra-fast execution, and easy CI integration.
  5. AI-Centric Design: Built to help developers and AI agents understand complex QGIS plugins instantly.

๐Ÿš€ Installation and Usage

Installation with uv (Recommended):

If you have uv installed, you can install the analyzer quickly and in isolation:

1. As a global tool (isolated):

uv tool install git+https://github.com/geociencio/qgis-plugin-analyzer.git

2. Standard pip installation (Git):

pip install git+https://github.com/geociencio/qgis-plugin-analyzer.git

2. Local installation for development:

git clone https://github.com/geociencio/qgis-plugin-analyzer
cd qgis-plugin-analyzer
uv sync

Installation with pip:

pip install .

Main Commands:

1. Analyze a Plugin (Full Analysis):

qgis-analyzer analyze /path/to/your/plugin -o ./quality_report

2. Specialized Analysis (NEW in v1.9.0):

# Internationalization audit only
qgis-analyzer analyze i18n /path/to/your/plugin

# Security vulnerability scanning only
qgis-analyzer analyze security /path/to/your/plugin

# Performance and UI blocking detection only
qgis-analyzer analyze performance /path/to/your/plugin

# Dependency and coupling analysis only
qgis-analyzer analyze architecture /path/to/your/plugin

# QGIS metadata validation only
qgis-analyzer analyze metadata /path/to/your/plugin

3. Auto-Fix issues (Dry Run):

qgis-analyzer fix /path/to/your/plugin

4. Legacy Support: The default command remains analysis if no subcommand is specified:

qgis-analyzer /path/to/your/plugin

๐Ÿ”„ Pre-commit Hook

You can run qgis-plugin-analyzer automatically before every commit to ensure quality. Add this to your .pre-commit-config.yaml:

  - repo: https://github.com/geociencio/qgis-plugin-analyzer
    rev: main  # Use 'main' for latest features or a specific tag like v1.5.0
    hooks:
      - id: qgis-plugin-analyzer

๐Ÿค– GitHub Action

Use it directly in your CI/CD workflows:

steps:
  - uses: actions/checkout@v4
  - name: Run QGIS Quality Check
    uses: geociencio/qgis-plugin-analyzer@main
    with:
      path: .
      output: quality_report
      args: --profile release

โš™๏ธ Configuration (pyproject.toml)

You can customize the analyzer's behavior using a [tool.qgis-analyzer] section in your pyproject.toml.

[tool.qgis-analyzer]
# Profiles allow different settings for CI vs Local
[tool.qgis-analyzer.profiles.default]
strict = false
generate_html = false  # CLI default

[tool.qgis-analyzer.profiles.release]
strict = true
fail_on_error = true

[tool.qgis-analyzer.profiles.default.rules]
QGS101 = "error"    # Ban specific module imports
QGS105 = "warning"  # Warn on iface usage
QGS303 = "ignore"   # Ignore resource path checks

โš ๏ธ Technical Limitations

This tool performs Static Analysis (AST & Regex parsing). It does not execute your code or load QGIS libraries.

  • Dynamic Imports: Imports inside functions or conditional blocks might be analyzed differently than top-level imports.
  • Runtime Validation: Checks like "Missing Resources" rely on static string analysis of .qrc files and path strings. It cannot verify resources loaded dynamically at runtime.
  • False Positives: While we strive for accuracy, complex meta-programming or unusual patterns might trigger false positives. Use # noqa or .analyzerignore to handle these cases.

โŒจ๏ธ Full CLI Reference

Note: The Python package is named qgis-plugin-analyzer, but the command-line tool is installed as qgis-analyzer.

qgis-analyzer analyze [scope] [path]

Audits an existing QGIS plugin repository with optional specialized scopes.

NEW in v1.9.0: Specialized analysis scopes for targeted auditing.

Available Scopes:

  • i18n - Internationalization and translation audit (detects untranslated strings)
  • security - Security vulnerability scanning (unsafe calls, hardcoded secrets, SQL injection)
  • performance - Performance and UI blocking detection (blocking loops, missing indexes)
  • architecture - Dependency and coupling analysis (imports, QGIS API usage)
  • metadata - QGIS metadata validation (metadata.txt compliance)
  • all or no scope - Full analysis (default, legacy compatible)

Arguments:

Argument Description Default
scope (Optional) Analysis scope: i18n, security, performance, architecture, metadata, or all. all
project_path (Required) Path to the plugin directory to analyze. .
-o, --output Directory where HTML/Markdown reports will be saved. ./analysis_results
-r, --report Explicitly generate detailed HTML/Markdown reports. False
-p, --profile Configuration profile from pyproject.toml (default, release). default

Examples:

# Full analysis (legacy compatible)
qgis-analyzer analyze .
qgis-analyzer analyze /path/to/plugin

# Specialized i18n analysis
qgis-analyzer analyze i18n .

# Security-only scan with reports
qgis-analyzer analyze security . --report

qgis-analyzer fix

Automatically fix common QGIS issues identified during analysis.

Argument Description Default
path (Required) Path to the plugin directory. N/A
--dry-run Show proposed changes without applying them. True
--apply Apply fixes to the files (disables dry-run). False
--auto-approve Apply fixes without interactive confirmation. False
--rules Comma-separated list of rule IDs to fix. Fix all
-o, --output Directory to read previous analysis from. ./analysis_results

qgis-analyzer summary

Shows a professional, color-coded summary of findings directly in your terminal.

Argument Description Default
-b, --by Granularity of the summary: total, modules, functions, classes. total
-i, --input Path to the project_context.json file to summarize. analysis_results/project_context.json

qgis-analyzer security

Performs a focused security scan on a file or directory.

Argument Description Default
path (Required) Path to the file or directory to scan. N/A
--deep Run more intensive (but slower) security checks. False
-p, --profile Configuration profile. default

qgis-analyzer version

Shows the current version of the analyzer.

Example:

# Executive summary
qgis-analyzer summary

# Identify high-complexity functions
qgis-analyzer summary --by functions

qgis-analyzer list-rules

Displays the full catalog of implemented QGIS audit rules with their severity and descriptions.

qgis-analyzer graph

Visualizes the project's dependency graph.

Argument Description Default
project_path Path to the plugin directory. .
--format Output format: text or mermaid. text

qgis-analyzer serve

Starts a local web server to view the generated HTML reports.

Argument Description Default
path Path to the analysis results directory. ./analysis_results
--port Port to run the server on. 8000

qgis-analyzer init

Initializes a recommended .analyzerignore file in the current directory with common Python and QGIS development exclusions.

๐Ÿ“Š Generated Reports

  • project_context.json: Full structured data for external integrations.

๐Ÿ“œ Audit Rules

For a complete list of all implemented checks, their severity, and recommendations, please refer to the:

๐Ÿ‘‰ Detailed Rules Catalog (RULES.md)

๐Ÿ“š References and Standards

The development of this analyzer is based on official QGIS community guidelines, geospatial standards, and industry best practices:

Official QGIS Documentation

Industry & Community Standards

Security Standards

  • Bandit (PyCQA): The security rules implemented (B1xx - B6xx) are directly derived from the Bandit project's rule set for identifying common security issues in Python code.
  • CWE (Common Weakness Enumeration): Security findings are mapped to standard CWE IDs (e.g., CWE-78 Command Injection, CWE-89 SQL Injection) for industry-standard classification.
  • OWASP Top 10: The "Hardcoded Secret" and "Injection" checks align with critical OWASP vulnerabilities.

Internal Resources

๐Ÿ› ๏ธ Contributing

Contributions are welcome! Please refer to our Contributing Guide to learn how to report bugs, propose rules, and submit code changes.

Audit rules are located in src/analyzer/scanner.py. Feel free to add new rules following the existing pattern!


โš–๏ธ License

This project is licensed under the GNU General Public License v3 (GPL v3). See the LICENSE file for details.


Developed for the SecInterp team and the QGIS community.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

qgis_plugin_analyzer-1.13.1.tar.gz (102.7 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

qgis_plugin_analyzer-1.13.1-py3-none-any.whl (106.6 kB view details)

Uploaded Python 3

File details

Details for the file qgis_plugin_analyzer-1.13.1.tar.gz.

File metadata

  • Download URL: qgis_plugin_analyzer-1.13.1.tar.gz
  • Upload date:
  • Size: 102.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.10 {"installer":{"name":"uv","version":"0.10.10","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Manjaro Linux","version":null,"id":null,"libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for qgis_plugin_analyzer-1.13.1.tar.gz
Algorithm Hash digest
SHA256 b360fa6a640d615046ef76486d64155be04e3621c8051b7776c17915f3585c09
MD5 9c83a9dd5996b489b6d122db263e89c8
BLAKE2b-256 dec2df514f95ce7a6426ac44f3e8d289b18804e275454341bda50a6746b789d8

See more details on using hashes here.

File details

Details for the file qgis_plugin_analyzer-1.13.1-py3-none-any.whl.

File metadata

  • Download URL: qgis_plugin_analyzer-1.13.1-py3-none-any.whl
  • Upload date:
  • Size: 106.6 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.10 {"installer":{"name":"uv","version":"0.10.10","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Manjaro Linux","version":null,"id":null,"libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for qgis_plugin_analyzer-1.13.1-py3-none-any.whl
Algorithm Hash digest
SHA256 1a9be5f7d290e5ade0f85ca06ea757a9ec888b13eec9229509ee98e6b2361a7a
MD5 9d2c617ca674f349c6ea55d5d1d7606e
BLAKE2b-256 c3d22cb668f101ed0793b3854a3f9d0d625e06c0b6902f1d8821d829171f3376

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page