Go Box Checker

C+ 74 completed
Other
unknown / go · tiny
49
Files
25,862
LOC
1
Frameworks
5
Languages

Pipeline State

completed
Run ID
#396432
Phase
done
Progress
1%
Started
Finished
2026-04-13 01:31:02
LLM tokens
0

Pipeline Metadata

Stage
Cataloged
Decision
proceed
Novelty
67.27
Framework unique
Isolation
Last stage change
2026-05-10 03:35:24
Deduplication group #55208
Member of a group with 2 similar repo(s) — this repo is canonical view group →
Top concepts (2)
Project DescriptionTesting
Repobility analyzer · published findings · https://repobility.com

AI Prompt

Create a static analysis tool, similar to what's described for Go parsers, that verifies box depth balancing. I need it to take a path to a Go file and check if all execution paths from a specified entry function end with a box depth of zero. The tool should use abstract interpretation, perform worklist-based CFG analysis, and handle complex control flow like if/for/switch statements. It should be runnable via a CLI, ideally using Python and leveraging pytest for testing.
go static-analysis python cli compiler abstract-interpretation cfg security
Generated by gemma4:latest

Catalog Information

A static analysis tool that verifies box depth balancing in Go hand-written recursive descent parsers.

Description

A static analysis tool that verifies box depth balancing in Go hand-written recursive descent parsers.

Novelty

3/10

Tags

go static-analysis python cli compiler abstract-interpretation cfg security

Claude Models

claude-opus-4-6

Quality Score

C+
74.2/100
Structure
76
Code Quality
77
Documentation
60
Testing
70
Practices
68
Security
100
Dependencies
60

Strengths

  • Good test coverage (471% test-to-source ratio)
  • Code linting configured (ruff (possible))
  • Consistent naming conventions (snake_case)
  • Good security practices \u2014 no major issues detected
  • Properly licensed project

Weaknesses

  • No CI/CD configuration \u2014 manual testing and deployment

Recommendations

  • Set up CI/CD (GitHub Actions recommended) to automate testing and deployment

Security & Health

4.6h
Tech Debt (A)
A
OWASP (100%)
PASS
Quality Gate
A
Risk (0)
Citation: Repobility (2026). State of AI-Generated Code. https://repobility.com/research/
MIT
License
0.0%
Duplication
Full Security Report AI Fix Prompts SARIF SBOM

Languages

go
75.1%
text
13.9%
python
9.9%
markdown
1.1%
toml
0.1%

Frameworks

pytest

Concepts (2)

All metrics by Repobility · https://repobility.com
CategoryNameDescriptionConfidence
Provenance: Repobility (https://repobility.com) — every score reproducible from /scan/
auto_descriptionProject DescriptionA static analysis tool that verifies box depth balancing in Go hand-written recursive descent parsers.80%
auto_categoryTestingtesting70%

Quality Timeline

1 quality score recorded.

View File Metrics

Embed Badge

Add to your README:

![Quality](https://repos.aljefra.com/badge/120794.svg)
Quality BadgeSecurity Badge
Export Quality CSVDownload SBOMExport Findings CSV