Metadata-Version: 2.4
Name: code-analyzer-b
Version: 0.2.2
Summary: A tool to analyze code repositories for security vulnerabilities using DeepSeek AI
Home-page: https://github.com/BotirBakhtiyarov/code_analyzer-b
Author: Botir Bakhtiyarov
Author-email: botirbakhtiyarovb@gmail.com
Classifier: Programming Language :: Python :: 3
Classifier: License :: OSI Approved :: MIT License
Classifier: Operating System :: OS Independent
Classifier: Development Status :: 4 - Beta
Classifier: Intended Audience :: Developers
Classifier: Topic :: Software Development :: Quality Assurance
Requires-Python: >=3.6
Description-Content-Type: text/markdown
License-File: LICENSE
Requires-Dist: requests
Requires-Dist: tqdm
Dynamic: author
Dynamic: author-email
Dynamic: classifier
Dynamic: description
Dynamic: description-content-type
Dynamic: home-page
Dynamic: license-file
Dynamic: requires-dist
Dynamic: requires-python
Dynamic: summary

# Code Analyzer

**Code Analyzer** is a powerful command-line tool for analyzing code repositories for security vulnerabilities and bugs. It leverages the DeepSeek API to provide AI-powered insights into your codebase, helping you identify and address potential issues efficiently.

**Version**: 0.2.x

---

## Installation

To install Code Analyzer version 0.2.x, use pip:

```bash
pip install code-analyzer==0.2.x
```

After installation, set up your DeepSeek API key:

```bash
code_analyzer setup
```

Follow the prompts to enter your API key. You can obtain a key from [DeepSeek](https://www.deepseek.com/).

---

## Usage

### Analyzing a GitHub Repository

To analyze a public GitHub repository:

```bash
code_analyzer analyze https://github.com/user/repo
```

For private repositories, use the `--git-token` option with a GitHub access token:

```bash
code_analyzer analyze https://github.com/user/private-repo --git-token YOUR_TOKEN
```

### Analyzing a Local Directory

To analyze a local directory:

```bash
code_analyzer analyze /path/to/local/repo
```

Or, to analyze the current directory:

```bash
code_analyzer analyze .
```

### Options

- `-o, --output FILE`: Save the report to a file (supports `.txt`, `.md`, `.html`, `.json`, `.sarif`).
- `-f, --format FORMAT`: Specify the output format (`txt`, `md`, `html`, `json`, `sarif`).
- `--verbose`: Enable detailed output for debugging.
- `--no-details`: Exclude detailed findings from the report.
- `--lang LANG`: Set the report language (`en`, `uz`, `zh`, `ru`).
- `--no-stream`: Suppress console output and save directly to the output file.

Example with options:

```bash
code_analyzer analyze . --output report.sarif --format sarif --no-stream --lang uz
```

---

## Features

- **AI-Powered Analysis**: Utilizes DeepSeek's API for intelligent code analysis.
- **Multi-Language Support**: Reports available in English, Uzbek, Chinese, and Russian.
- **CI/CD Integration**: Easily integrates with GitHub Actions for automated code scanning.
- **Flexible Output**: Supports multiple report formats, including SARIF for GitHub code scanning.
- **Local and Remote Analysis**: Analyze both local directories and remote GitHub repositories.

---

For more information, visit the [GitHub repository](https://github.com/BotirBakhtiyarov/code_analyzer-b).

