Everything you need to get started with Repobility
Connect Gitea, Forgejo, GitHub, GitLab, Bitbucket, Azure DevOps, or a generic Git host from settings. Tokens are encrypted at rest and matched by host when private repositories are cloned or checked.
Paste any public Git URL (HTTPS) to analyze repositories from any provider. For private repositories, provide authentication via the settings panel.
After analysis completes, your repository dashboard shows:
Each finding has a stable fingerprint and lifecycle state. Rescans show what is new, reopened, unchanged, fixed, suppressed, or marked false positive instead of creating duplicate rows.
Add a small ignore file at the repository root to suppress known generated files, sample credentials, or reviewed exceptions.
SEC020 app/logging.py reason="redacted metadata only" expires=2026-12-31
gitleaks:* docs/** reason="documented sample credentials"
* generated/** reason="generated vendor output"
Each finding includes a tailored prompt designed for AI coding assistants. These prompts include:
Simply copy the prompt and paste it into Claude, ChatGPT, GitHub Copilot, or any AI assistant to get an immediate fix.
Quality is measured across 8 dimensions:
| Dimension | What It Measures |
|---|---|
| Structure | File organization, module boundaries, naming conventions |
| Code Quality | Complexity, duplication, code smells |
| Documentation | README, inline docs, API documentation coverage |
| Testing | Test file presence, coverage indicators, test patterns |
| Best Practices | Linting config, CI/CD, containerization, .gitignore |
| Security | Vulnerability count, secret exposure, OWASP compliance |
| Dependencies | Outdated packages, vulnerability exposure, license risk |
| Maintainability | Cognitive complexity, tech debt ratio, change risk |
Security findings are classified by severity:
Analysis results can be exported in multiple formats:
Open findings can be exported from the issue board or through /api/v2/repos/<id>/sarif/?state=open. SARIF from other scanners can be imported through /api/v2/repos/<id>/import_sarif/.
The REST API supports repository results, findings, check runs, provider connections, and scoped service keys for CI/CD. Use service keys for pipelines and restrict each key to the minimum scopes and repositories needed.
checks:write submits CI check results.checks:read reads check history and gate results.repos:read reads repository scores and findings.
# Example: List your repositories
curl -H "Authorization: Bearer REPOBILITY_API_KEY" \
https://repobility.com/api/v2/repos/
# Example: Get analysis findings
curl -H "Authorization: Bearer REPOBILITY_API_KEY" \
https://repobility.com/api/v2/repos/123/findings/