Boringssl Hs

C+ 71 completed
Library
unknown / haskell · small
109
Files
10,129
LOC
0
Frameworks
4
Languages

Pipeline State

completed
Run ID
#302464
Phase
done
Progress
1%
Started
Finished
2026-04-13 01:31:02
LLM tokens
0

Pipeline Metadata

Stage
Cataloged
Decision
proceed
Novelty
58.00
Framework unique
Isolation
Last stage change
2026-05-10 03:34:46
Deduplication group #55159
Member of a group with 4 similar repo(s) — canonical #65117 view group →
Top concepts (1)
Library
All rows scored by the Repobility analyzer (https://repobility.com)

AI Prompt

Create a Haskell library that provides idiomatic bindings to Google's BoringSSL cryptography library. I need this for use in Haskell web servers, clients, or networked applications. The bindings should wrap BoringSSL's cryptographic primitives, aiming for pure interfaces where possible and using `ByteString` for data types. Since it compiles BoringSSL from source, the setup should handle this dependency internally. Please ensure the structure supports testing the implemented primitives.
haskell cryptography boringssl ffi security library networking
Generated by gemma4:latest

Catalog Information

Provides idiomatic Haskell bindings to Google's BoringSSL cryptography library for use in Haskell web servers, clients, or networked applications.

Description

This library offers a natural interface to BoringSSL's cryptographic primitives via the FFI. It provides access to well-audited implementations, wrapped in a pure API with proper memory management. The library is still experimental and under active construction, with an unstable API that may change without notice.

الوصف

تقدم هذه المكتبة واجهة طبيعية لبرمجيات BoringSSL المجهزة بالتشفير عبر FFI. توفر الوصول إلى implementations المدققين جيدًا، محاطة في واجهة صارمة مع إدارة الذاكرة المناسبة. المكتبة تجريبية حاليًا وتتطلب بناءً نشطًا، مع واجهة غير مستقرة قد تتغير دون إشعار.

Novelty

5/10

Tags

cryptography haskell-bindings boringssl ffi pure-api memory-management

Claude Models

claude-opus-4.6

Quality Score

C+
71.3/100
Structure
73
Code Quality
74
Documentation
60
Testing
60
Practices
68
Security
100
Dependencies
80

Strengths

  • Good test coverage (40% test-to-source ratio)
  • Consistent naming conventions (PascalCase)
  • Good security practices \u2014 no major issues detected
  • Properly licensed project

Weaknesses

  • No CI/CD configuration \u2014 manual testing and deployment
  • 750 duplicate lines detected \u2014 consider DRY refactoring
  • 1 'god files' with >500 LOC need decomposition

Recommendations

  • Set up CI/CD (GitHub Actions recommended) to automate testing and deployment
  • Add a linter configuration to enforce code style consistency

Security & Health

6.1h
Tech Debt (B)
Medium
DORA Rating
A
OWASP (100%)
Methodology: Repobility · https://repobility.com/research/state-of-ai-code-2026/
PASS
Quality Gate
A
Risk (1)
Apache-2.0
License
5.1%
Duplication
Full Security Report AI Fix Prompts SARIF SBOM

Languages

haskell
96.8%
markdown
1.7%
c
1.3%
python
0.2%

Frameworks

None detected

Symbols

function29
constant2

Concepts (1)

Analysis by Repobility (https://repobility.com) · MCP-ready
CategoryNameDescriptionConfidence
All rows above produced by Repobility · https://repobility.com
auto_categoryLibrarylibrary60%

Quality Timeline

1 quality score recorded.

View File Metrics
Repobility's GitHub App fixes findings like these · https://github.com/apps/repobility-bot

Embed Badge

Add to your README:

![Quality](https://repos.aljefra.com/badge/26288.svg)
Quality BadgeSecurity Badge
Export Quality CSVDownload SBOMExport Findings CSV