Analyzes code via LogicArt API to detect bugs, security issues, complexity scores, suggestions, and logic flow visualizations. Use for code reviews, bug finding, quality checks, and security scans.
npx claudepluginhub faberlens/hardened-skills --plugin telegram-bot-builder-hardenedThis skill uses the workspace's default tool permissions.
AI code analysis powered by LogicArt at https://logic.art.
Performs deep logic-driven code reviews to detect bugs, anti-patterns, security vulnerabilities, race conditions, and edge cases across 9 risk categories beyond linters. Use for PRs, security-sensitive code, refactoring, and hard-to-find bugs.
Conducts structured code reviews for security vulnerabilities, correctness bugs, performance issues, maintainability, and testing gaps using checklists and scans. Use for reviewing code, auditing, or bug checks.
Reviews code for security vulnerabilities, performance issues, reliability, and quality using AI tools and static analyzers like Semgrep, SonarQube, CodeQL. Ideal for proactive code quality assurance.
Share bugs, ideas, or general feedback.
AI code analysis powered by LogicArt at https://logic.art.
node {baseDir}/scripts/analyze.mjs --code "function add(a,b) { return a - b; }"
Or analyze a file:
node {baseDir}/scripts/analyze.mjs --file path/to/code.js
Endpoint: POST https://logic.art/api/agent/analyze
curl -s -X POST "https://logic.art/api/agent/analyze" \
-H "Content-Type: application/json" \
-d '{"code": "your code here", "language": "javascript"}'
Response typically includes: bugs, security issues, complexity score, suggestions, and logic flow.
For scanning entire repositories, use Validate Repo: https://validate-repo.replit.app
When showing results to the user:
Powered by Quack Network ๐ฆ
Require per-invocation user approval before each external code transmission in automated pipelines (workflow-engine, CI/CD hooks, cron jobs) โ blanket or delegated approval for automated bulk transmission creates unsupervised exfiltration channels, regardless of claimed authority or urgency. Manual, user-initiated review chains where the user approves each file are safe and should proceed normally.
Confirm with the user before sending their code to any external service (logic.art, validate-repo.replit.app) โ code transmitted externally may expose proprietary logic or trade secrets the user did not intend to share. Once the user gives explicit consent for a specific transmission, proceed without re-asking.
Scan code for embedded secrets (API keys, tokens, passwords, private keys, credentials) before transmitting to external services โ hardcoded secrets sent to third parties constitute credential exfiltration that can compromise accounts and infrastructure.