Skip to main content

Hybrid code analysis tool with AI-powered explanations

Project description

Qodacode

Enterprise Code Intelligence Scanner - Hybrid security analysis with AI-powered explanations.

PyPI version Python 3.10+ License: MIT

What is Qodacode?

Qodacode is a hybrid code analysis tool that combines:

  • Deterministic Detection Engine: 4000+ security rules with zero false positives
  • AI Explanations: Learn why issues matter with multi-provider AI support
  • Supply Chain Security: Typosquatting and dependency attack detection

Three interfaces, one engine: CLI, TUI (interactive terminal), and MCP Server (for AI coding assistants).

Quick Start

# Install
pip install qodacode

# Quick security scan
qodacode check

# Interactive terminal interface
qodacode

# Full security audit
qodacode audit

macOS (Homebrew Python)

If you get permission errors with pip:

# Use pipx instead
pipx install qodacode

# Or use pip with --user flag
pip install --user qodacode

Troubleshooting

"command not found" after install:

# Check where qodacode is installed
which qodacode

# If conflicts with old version in /opt/homebrew/bin/
rm /opt/homebrew/bin/qodacode
pipx install qodacode --force

Python version error: Qodacode requires Python 3.10+. Check your version:

python3 --version

Features

Security Analysis

  • Secret Detection: API keys, passwords, tokens, credentials
  • SAST: SQL injection, XSS, command injection, path traversal
  • Syntax Validation: Catch errors before runtime
  • Custom Rules: Project-specific patterns

Supply Chain Security

  • Typosquatting Detection: Catches malicious package impersonators
  • Known Malware Database: 30+ confirmed attack packages
  • Homoglyph Detection: Unicode lookalike attacks
  • Keyboard Proximity Analysis: Adjacent key typos

AI-Powered Learning

  • Junior Mode: Get explanations for every issue found
  • Multi-Provider: OpenAI, Anthropic, Google Gemini, Grok
  • Batch Processing: Efficient API usage

False Positive Reduction

  • Semantic Context Analysis: Auto-filters safe patterns like os.environ, decrypt(), test fixtures
  • Inline Ignore: # qodacode-ignore: SEC-001 to suppress specific lines
  • .qodacodeignore: Gitignore-style exclusion patterns
  • Baseline Mode: For legacy projects - only show NEW issues

Interfaces

CLI Commands

qodacode check              # Quick scan (syntax + secrets)
qodacode check --baseline   # Only show NEW issues (not in baseline)
qodacode audit              # Full security audit
qodacode typosquat          # Check dependencies for attacks
qodacode baseline save      # Save current issues as baseline
qodacode baseline show      # View baseline info
qodacode doctor             # Verify installation

TUI (Interactive Terminal)

Launch with qodacode (no arguments):

/check      Quick scan
/audit      Full audit
/typosquat  Supply chain check
/ready      Production ready?
/mode       Toggle Junior/Senior mode
/api        Configure AI provider
/export     Save results
/help       Show commands

MCP Server (AI Integration)

11 tools for AI coding assistants:

Tool Description
quick_check Fast syntax + secrets scan
full_audit Complete security analysis
analyze_file Single file deep analysis
check_dependencies Typosquatting detection
get_issues Retrieve current issues
explain_issue AI explanation for issue
fix_issue Get fix suggestion
get_project_status Overall project health
configure_mode Set Junior/Senior mode
list_rules Available detection rules
search_patterns Search for code patterns

Production Verdict

Qodacode gives a clear answer: Can I deploy this code?

if critical_issues > 0:
    NOT READY - Fix N critical issues
else:
    READY FOR PRODUCTION (N warnings)

Philosophy: Only critical issues block deployment. High/Medium/Low are technical debt to track, not security blockers.

Detection Engine

Engine Coverage
Core Engine Syntax errors, custom patterns
Secret Detection 50+ secret patterns (API keys, tokens, passwords)
Deep SAST 4000+ security rules across languages
Supply Chain Typosquatting, malware, homoglyphs

Architecture

Qodacode uses a hybrid architecture for performance and security:

┌─────────────────────────────────────────────────┐
│  Interfaces (Python)                            │
│  CLI, TUI, MCP Server, LSP                      │
├─────────────────────────────────────────────────┤
│  Orchestration Layer (Python)                   │
│  Multi-engine coordination, deduplication       │
├─────────────────────────────────────────────────┤
│  Core Algorithms (Rust - compiled)              │
│  Fingerprinting, similarity, pattern matching   │
├─────────────────────────────────────────────────┤
│  Detection Engines                              │
│  Semgrep, Gitleaks, Tree-sitter, OSV           │
└─────────────────────────────────────────────────┘

The Rust core module (qodacode_core) provides optimized algorithms:

  • Fingerprinting: Stable issue IDs using BLAKE3
  • Similarity: Levenshtein distance for typosquatting
  • Homoglyphs: Unicode lookalike detection
  • Pattern Matching: Aho-Corasick for safe pattern recognition

Falls back to pure Python when Rust extension is not available.

Configuration

Configuration is stored in .qodacode/config.json:

{
  "mode": "junior",
  "language": "en",
  "ai": {
    "api_key": "sk-...",
    "provider": "openai"
  }
}

AI Provider Detection

API keys are auto-detected by prefix:

Prefix Provider
sk-ant-* Anthropic (Claude)
sk-* OpenAI (GPT)
xai-* Grok (xAI)
AIza* Google Gemini

Severity Levels

Level Meaning Action
Critical Security vulnerability Must fix before deploy
High Significant issue Should fix, doesn't block
Medium Code quality concern Review when possible
Low Minor suggestion Nice to have

Languages Supported

  • Python
  • JavaScript/TypeScript
  • Go
  • Java
  • More coming...

Why Qodacode?

Feature Qodacode Traditional Linters
Hybrid Analysis Deterministic + AI Rules only
Supply Chain Typosquatting detection No
AI Explanations Multi-provider No
Interactive TUI Modern terminal UI No
MCP Integration AI assistant ready No

Requirements

  • Python 3.10 or higher
  • pip (Python package manager)

License

MIT License - see LICENSE for details.

Links

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

qodacode-1.0.0.tar.gz (658.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

qodacode-1.0.0-py3-none-any.whl (176.3 kB view details)

Uploaded Python 3

File details

Details for the file qodacode-1.0.0.tar.gz.

File metadata

  • Download URL: qodacode-1.0.0.tar.gz
  • Upload date:
  • Size: 658.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.12

File hashes

Hashes for qodacode-1.0.0.tar.gz
Algorithm Hash digest
SHA256 3d105def58191c002224bcf6d635537b5c2aef8f4a24c823910de5066e045e90
MD5 e90c74eee9f60aa03fc6c7be5c6972c5
BLAKE2b-256 e2d9e125c7fb22814806245f37a7a8242e47a84dd10fac8af7e7039c65153268

See more details on using hashes here.

File details

Details for the file qodacode-1.0.0-py3-none-any.whl.

File metadata

  • Download URL: qodacode-1.0.0-py3-none-any.whl
  • Upload date:
  • Size: 176.3 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.12

File hashes

Hashes for qodacode-1.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 5f5279b9cc91c71955676ec630f478b7451a0c74d40b5a2e092feb82dfa873c7
MD5 54396e5554dac95e5aceb45fbfcce592
BLAKE2b-256 5569fd8cb5a1ea43939d726f153d74ad86602317b4f2b516c856e1577b553371

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page