multi-layer engine, AI false-positive filter, ranked actions, atlas — all free, no signup required to try it.
Anonymous scans are rate-limited to 10 new repos/day per IP. Sign up free for unlimited submits + per-account scan history.
AI agents: see /roast/
for full API instructions, idempotency rules, and Retry-After headers.
Claude Code, Cursor, Codex CLI, Gemini CLI â paste one prompt and the agent submits, reads findings,
and (optionally) files the report back as a GitHub issue. Per-finding ai_fix_prompt means
your AI does the fix; we provide the recipe.
NEW MCP server is live: manifest · stdio wrapper · voting protocol for TP/FP calibration.
Three steps to better code
Link your GitHub, GitLab, Bitbucket, or any Git repository. We support public and private repos.
A broad set of analyzers scan every file: security, quality, dependencies, complexity, duplication, and more.
Receive precise, copy-paste prompts for Claude, GPT, or any AI coder to automatically fix every issue found.
Every dimension of code health, covered
OSV/CVE/NVD matching against all your dependencies. Know your exposure.
Curated regex set covering major cloud providers + common secret formats. Find leaked credentials instantly.
Taint analysis across major languages. CWE/OWASP-mapped findings.
8-dimension scoring: structure, quality, docs, testing, practices, security, dependency health.
DAG construction, cycle detection, import extraction across the major languages.
Multi-language parsers for call graphs, inheritance trees, and API endpoint detection.
Cross-file duplicate block detection via rolling hash. Eliminate redundant code.
Remediation effort in hours, debt ratio, A-E rating for prioritization.
Every finding comes with a tailored prompt you can paste directly into Claude, ChatGPT, GitHub Copilot, or any AI coding assistant. No more guessing what to ask — we generate the precise context and instructions.
Fix the SQL injection vulnerability in auth/login.py at line 45.
The current code uses string formatting to build the SQL query:
query = f"SELECT * FROM users WHERE email = '{email}'"
Replace with parameterized query:
query = "SELECT * FROM users WHERE email = %s"
cursor.execute(query, [email])
This addresses CWE-89 (SQL Injection) and OWASP A03:2021.
Ensure all other database queries in this file use
parameterized queries as well.
Start free. Scale as you grow.
per month
per month
contact us
A multi-layer engine built on a deep cross-repo corpus. Join the developers and security teams using Repobility to ship safer code.
Start Free Analysis