Skip to main content

A SonarQube-like static analysis CLI for multi-language repositories.

Project description

supersonar

supersonar is a lightweight, static analysis CLI for multi-language repositories. It is designed for local use and CI pipelines via pip install (Python 3.10+).

Project Description

supersonar is a production-focused static analysis CLI for mixed repositories (backend, frontend, and infrastructure). It scans source code and deployment artifacts (including Dockerfile and Kubernetes manifests), produces JSON/SARIF reports, and can enforce security quality gates in CI/CD before deployment.

Supported Languages

  • Python
  • Java
  • Kotlin
  • JavaScript / React (.js, .jsx, .ts, .tsx)
  • Go

Quick start

pip install .
supersonar scan . --format json
supersonar scan . --pretty

Pipeline install (pip)

Use an isolated environment in CI:

python -m venv .venv
. .venv/bin/activate
python -m pip install --upgrade pip
python -m pip install supersonar
supersonar --version
supersonar scan . --format sarif --out reports/supersonar.sarif

Or install from repository source directly:

python -m pip install "git+https://github.com/mortaccio/supersonar.git@main"

The scanner performs real code checks (AST + regex), including:

  • dynamic execution (eval/exec)
  • broad exception handlers
  • subprocess.*(..., shell=True) in Python
  • unsafe yaml.load(...) in Python
  • unsafe pickle.load/loads(...) in Python
  • requests(..., verify=False) in Python
  • cross-language readability checks (line too long, trailing whitespace, oversized file)
  • duplicate-code block detection (repeated multi-line chunks)
  • Java package naming convention checks (lower.case.package)
  • Java type naming convention checks (UpperCamelCase)
  • Java class/file naming consistency checks (MyClass in MyClass.java)
  • Java method naming convention checks (lowerCamelCase)
  • Java constant naming convention checks (UPPER_SNAKE_CASE)
  • Java complexity checks (too many method parameters, very long methods, deep nesting)
  • Java coupling/cohesion checks (high import fan-out, classes with too many methods, low cohesion)
  • Java command execution usage (Runtime.exec, ProcessBuilder)
  • Kotlin checks (package/type/function naming, too many parameters, long functions, deep nesting)
  • Kotlin command execution usage (Runtime.exec, ProcessBuilder)
  • Python naming checks (snake_case functions, UpperCamelCase classes)
  • Python complexity checks (too many parameters, very long functions, deep nesting)
  • Python coupling/cohesion checks (high import fan-out, classes with too many methods, low cohesion)
  • JavaScript/React checks (function/component naming, too many parameters, long functions, deep nesting)
  • Node.js command execution usage (child_process.exec/execSync)
  • Go checks (package/function naming, too many parameters, long functions, deep nesting, import fan-out)
  • Go security checks (InsecureSkipVerify: true, exec.Command("sh", "-c", ...))
  • hardcoded secret-like assignments
  • insecure external http:// endpoint literals
  • Dockerfile hardening checks (root user, unpinned image tags, curl/wget piped to shell)
  • Kubernetes manifest checks (privileged containers, privilege escalation, root policies, host namespace sharing)
  • private key block markers (for example BEGIN ... PRIVATE KEY)
  • TODO/FIXME markers
  • unresolved merge conflict markers

Python files use AST rules. Other file types use generic cross-language text rules.

CI usage

pip install supersonar
supersonar scan . \
  --format sarif \
  --out reports/supersonar.sarif \
  --fail-on high \
  --max-high 0 \
  --max-critical 0 \
  --coverage-xml coverage.xml \
  --min-coverage 80

Config (supersonar.toml)

[scan]
exclude = [".git", ".venv", "venv", "build", "dist", "__pycache__"]
include_extensions = [".py", ".java", ".js", ".jsx", ".ts", ".tsx", ".go", ".rs", ".cs", ".yaml", ".yml", ".json", ".toml"]
include_filenames = ["Dockerfile", "Jenkinsfile", "Makefile"]
max_file_size_kb = 1024
skip_generated = true
inline_ignore = true
security_only = false
disabled_rules = []
# enabled_rules = ["SS001", "SS003"]
coverage_xml = "coverage.xml"

[quality_gate]
fail_on = "high"
max_issues = 200
max_files_with_issues = 25
max_high = 0
max_critical = 0
min_coverage = 80.0
baseline_report = "reports/supersonar-baseline.json"
only_new_issues = true

[report]
format = "json"

Use CLI overrides when needed:

supersonar scan . --include-ext .java --include-ext .kt --include-file Dockerfile
supersonar scan . --security-only
supersonar scan . --pretty
supersonar scan . --security-only --format json --out reports/security-report.json

Quality gates

  • fail_on: fail if any issue exists at/above severity
  • max_issues: fail if total issues exceed threshold
  • max_files_with_issues: fail if number of files with at least one issue exceeds threshold
  • max_low, max_medium, max_high, max_critical: per-severity caps
  • min_coverage: minimum line coverage percentage from Cobertura XML
  • baseline_report + only_new_issues: gate only on issues not present in a previous report

Generate coverage.xml in Python projects with:

python -m pip install coverage
coverage run -m pytest
coverage xml -o coverage.xml

Noise control

  • Generated artifacts are skipped by default (target/, .mypy_cache/, .pytest_cache/, .tox/, .nox/, .gradle/, node_modules/, and common binary suffixes).
  • Use --include-generated when you explicitly want to scan generated/build outputs.
  • Inline suppression is supported per line:
    • # supersonar:ignore ignores all rules on that line.
    • # supersonar:ignore SS001,SS007 ignores specific rules on that line.
  • Rule-level controls:
    • --disable-rule SS004 (repeatable)
    • --enable-rule SS001 --enable-rule SS003 (allowlist mode)

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

supersonar-0.3.8.tar.gz (34.9 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

supersonar-0.3.8-py3-none-any.whl (36.2 kB view details)

Uploaded Python 3

File details

Details for the file supersonar-0.3.8.tar.gz.

File metadata

  • Download URL: supersonar-0.3.8.tar.gz
  • Upload date:
  • Size: 34.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.2

File hashes

Hashes for supersonar-0.3.8.tar.gz
Algorithm Hash digest
SHA256 8475d0b4a55d8f3a1516447f7c4908efce444e542197e40a5251d0264d11f9c2
MD5 21833b25ad33c0a30e20f47f1231917e
BLAKE2b-256 f0b76b2aa1931643f358d3d04115c7e56f2447992b88dd89cd1c8c001e634446

See more details on using hashes here.

File details

Details for the file supersonar-0.3.8-py3-none-any.whl.

File metadata

  • Download URL: supersonar-0.3.8-py3-none-any.whl
  • Upload date:
  • Size: 36.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.2

File hashes

Hashes for supersonar-0.3.8-py3-none-any.whl
Algorithm Hash digest
SHA256 bb09625417ba335f32c35e7a5b017561120e8430cbeecdf23359fe4dda740de6
MD5 14512020d55f378ca2fea7a2846cf8e8
BLAKE2b-256 95be9669642ff6bca6ffe3cadc74faa18e0bc1156e7057d8fb356bf9fe2f071b

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page