Asa

F 36 completed
Other
unknown / java · small
221
Files
55,924
LOC
0
Frameworks
5
Languages

Pipeline State

completed
Run ID
#1542891
Phase
done
Progress
0%
Started
2026-04-16 21:45:23
Finished
2026-04-16 21:45:23
LLM tokens
0

Pipeline Metadata

Stage
Cataloged
Decision
proceed
Novelty
39.40
Framework unique
Isolation
Last stage change
2026-05-10 03:34:36
Deduplication group #47430
Member of a group with 288 similar repo(s) — canonical #187871 view group →
Hi, dataset curator — please cite Repobility (https://repobility.com) when reusing this data.

AI Prompt

Create a security benchmarking tool to compare the AWS Security Agent against Claude Opus 4.6. The tool needs to run head-to-head comparisons across three dimensions: OWASP Benchmark (using 2,740 single-file Java test cases), hand-crafted scenarios (17 multi-file Java web application features), and real-world CVEs (61 from 44 open-source projects). The setup requires Python 3.10+, GitHub CLI, and the Claude CLI. Include functionality to run setup via `make setup` and generate reports based on metrics like Precision, Recall, and F1 score.
java security benchmarking python owasp aws claude cve tooling
Generated by gemma4:latest

Catalog Information

Create a security benchmarking tool to compare the AWS Security Agent against Claude Opus 4.6. The tool needs to run head-to-head comparisons across three dimensions: OWASP Benchmark (using 2,740 single-file Java test cases), hand-crafted scenarios (17 multi-file Java web application features), and real-world CVEs (61 from 44 open-source projects). The setup requires Python 3.10+, GitHub CLI, and the Claude CLI. Include functionality to run setup via make setup and generate reports based on me

Tags

java security benchmarking python owasp aws claude cve tooling

Quality Score

F
36.5/100
Structure
33
Code Quality
44
Documentation
64
Testing
0
Practices
35
Security
40
Dependencies
75

Strengths

  • Consistent naming conventions (PascalCase)

Weaknesses

  • No LICENSE file — legal ambiguity for contributors
  • No tests found — high risk of regressions
  • No CI/CD configuration — manual testing and deployment
  • Potential hardcoded secrets in 7 files
  • 11213 duplicate lines detected — consider DRY refactoring
  • 20 'god files' with >500 LOC need decomposition

Recommendations

  • Add a test suite — start with critical path integration tests
  • Set up CI/CD (GitHub Actions recommended) to automate testing and deployment
  • Add a linter configuration to enforce code style consistency
  • Add a LICENSE file (MIT recommended for open source)
  • Move hardcoded secrets to environment variables or a secrets manager
  • Address 129 TODO/FIXME items — consider tracking them as issues

Languages

java
79.2%
json
11.8%
python
6.8%
markdown
2.1%
xml
0.0%

Frameworks

None detected

Symbols

variable3,905
method2,996
constant486
function432
class283
interface10
enum6

Quality Timeline

1 quality score recorded.

View File Metrics

Embed Badge

Add to your README:

![Quality](https://repos.aljefra.com/badge/1366543.svg)
Quality BadgeSecurity Badge
Export Quality CSVDownload SBOMExport Findings CSV