You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add CodeSafer to the static analysis tool index by creating data/tools/codesafer.yml.
Note: I initially edited README.md directly, which failed the readme-check job (README is generated from YAML). Force-pushed a corrected commit that adds only data/tools/codesafer.yml and leaves README untouched.
Entry
name: CodeSafercategories:
- lintertags:
- ci
- security
- javascript
- typescript
- nodejs
- configfilelicense: ISCtypes:
- clisource: "https://github.com/goldmembrane/cleaner-code"homepage: "https://codesafer.org/"plans:
oss: truefree: truedescription: >- AI code security scanner packaged as a Model Context Protocol (MCP) server. Detects 9 categories of threats in AI-generated code...
About CodeSafer
CodeSafer is a static code security scanner packaged as a Model Context Protocol (MCP) server. It combines 8 deterministic static analysis scanners with a CodeBERT deep learning classifier to detect security threats in AI-generated code.
Force-pushed a corrected commit. Summary of the two check failures you may have seen:
readme-check (first run, failed) — My initial commit edited README.md directly. I've reset the branch and replaced it with data/tools/codesafer.yml. readme-check now passes on the new commit. README is untouched.
pr-check (current, failed) — The pr-check binary validated the YAML successfully (log shows Checking 'CodeSafer'... then exits). The actual failure is the downstream POST /repos/.../issues/1804/comments returning 403 Forbidden: Resource not accessible by integration, which is the standard fork-PR GITHUB_TOKEN limitation — forks can't write comments on upstream PRs. The YAML content itself passed validation.
Happy to adjust anything in the tool entry — categories, tags, wording. Thanks for maintaining this list!
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
What
Add CodeSafer to the static analysis tool index by creating
data/tools/codesafer.yml.Note: I initially edited
README.mddirectly, which failed thereadme-checkjob (README is generated from YAML). Force-pushed a corrected commit that adds onlydata/tools/codesafer.ymland leaves README untouched.Entry
About CodeSafer
CodeSafer is a static code security scanner packaged as a Model Context Protocol (MCP) server. It combines 8 deterministic static analysis scanners with a CodeBERT deep learning classifier to detect security threats in AI-generated code.
Key features:
Website: https://codesafer.org/
Source: https://github.com/goldmembrane/cleaner-code
License: ISC
Runtime: Node.js >= 18
Checklist
data/tools/codesafer.yml(not a direct README edit)data/tags.ymloss: true,free: truereflect the open-source ISC license and free tier