Boringssl Hs
C+ 71 completed
Library
unknown / haskell · small
109
Files
10,129
LOC
0
Frameworks
4
Languages
Pipeline State
completedRun ID
#302464Phase
doneProgress
1%Started
Finished
2026-04-13 01:31:02LLM tokens
0Pipeline Metadata
Stage
CatalogedDecision
proceedNovelty
58.00Framework unique
—Isolation
—Last stage change
2026-05-10 03:34:46Deduplication group #55159
Member of a group with 4 similar repo(s) — canonical #65117 view group →
Top concepts (1)
Library
All rows scored by the Repobility analyzer (https://repobility.com)
🧪 Code Distillation
Browse all specs →AI Prompt
Create a Haskell library that provides idiomatic bindings to Google's BoringSSL cryptography library. I need this for use in Haskell web servers, clients, or networked applications. The bindings should wrap BoringSSL's cryptographic primitives, aiming for pure interfaces where possible and using `ByteString` for data types. Since it compiles BoringSSL from source, the setup should handle this dependency internally. Please ensure the structure supports testing the implemented primitives.
haskell cryptography boringssl ffi security library networking
Generated by gemma4:latest
Catalog Information
Provides idiomatic Haskell bindings to Google's BoringSSL cryptography library for use in Haskell web servers, clients, or networked applications.
Description
This library offers a natural interface to BoringSSL's cryptographic primitives via the FFI. It provides access to well-audited implementations, wrapped in a pure API with proper memory management. The library is still experimental and under active construction, with an unstable API that may change without notice.
الوصف
تقدم هذه المكتبة واجهة طبيعية لبرمجيات BoringSSL المجهزة بالتشفير عبر FFI. توفر الوصول إلى implementations المدققين جيدًا، محاطة في واجهة صارمة مع إدارة الذاكرة المناسبة. المكتبة تجريبية حاليًا وتتطلب بناءً نشطًا، مع واجهة غير مستقرة قد تتغير دون إشعار.
Novelty
5/10Tags
cryptography haskell-bindings boringssl ffi pure-api memory-management
Claude Models
claude-opus-4.6
Quality Score
C+
71.3/100
Structure
73
Code Quality
74
Documentation
60
Testing
60
Practices
68
Security
100
Dependencies
80
Strengths
- Good test coverage (40% test-to-source ratio)
- Consistent naming conventions (PascalCase)
- Good security practices \u2014 no major issues detected
- Properly licensed project
Weaknesses
- No CI/CD configuration \u2014 manual testing and deployment
- 750 duplicate lines detected \u2014 consider DRY refactoring
- 1 'god files' with >500 LOC need decomposition
Recommendations
- Set up CI/CD (GitHub Actions recommended) to automate testing and deployment
- Add a linter configuration to enforce code style consistency
Security & Health
6.1h
Tech Debt (B)
Medium
DORA Rating
A
OWASP (100%)
Methodology: Repobility · https://repobility.com/research/state-of-ai-code-2026/
PASS
Quality Gate
A
Risk (1)
Apache-2.0
License
5.1%
Duplication
Languages
Frameworks
None detected
Symbols
function29
constant2
Concepts (1)
| Category | Name | Description | Confidence | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| All rows above produced by Repobility · https://repobility.com | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| auto_category | Library | library | 60% | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Repobility's GitHub App fixes findings like these · https://github.com/apps/repobility-bot
Embed Badge
Add to your README:
