Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Static code analysis tool. Detects security vulnerabilities, code smells, and complexity issues across 17 languages. All analysis runs locally — no code leav...
Static code analysis tool. Detects security vulnerabilities, code smells, and complexity issues across 17 languages. All analysis runs locally — no code leav...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Static code analysis for security, quality, and complexity. Supports 17 languages. Privacy: All analysis runs locally. No code is transmitted to external services. No network calls are made during analysis. Permissions: This tool reads source files in the specified directory (read-only). It does not modify your code.
pip install hefesto-ai
hefesto analyze /path/to/project --severity HIGH
hefesto analyze /path/to/project --severity CRITICAL # Critical only hefesto analyze /path/to/project --severity HIGH # High + Critical hefesto analyze /path/to/project --severity MEDIUM # Medium + High + Critical hefesto analyze /path/to/project --severity LOW # Everything
hefesto analyze /path/to/project --output text # Terminal (default) hefesto analyze /path/to/project --output json # Structured JSON hefesto analyze /path/to/project --output html --save-html report.html # HTML report hefesto analyze /path/to/project --quiet # Summary only
hefesto status hefesto --version
SQL injection and command injection Hardcoded secrets (API keys, passwords, tokens) Insecure configurations (Dockerfiles, Terraform, YAML) Path traversal and XSS risks
Logic alterations that preserve syntax but change intent Architectural degradation from AI-generated code Hidden duplicates and inconsistencies in monorepos
Cyclomatic complexity >10 (HIGH) or >20 (CRITICAL) Deep nesting (>4 levels) Long functions (>50 lines) Code smells and anti-patterns
Dockerfile: missing USER, no HEALTHCHECK, running as root Shell: missing set -euo pipefail, unquoted variables Terraform: missing tags, hardcoded values
Runtime network attacks (DDoS, port scanning) Active intrusions (rootkits, privilege escalation) Network traffic monitoring For these, use SIEM/IDS/IPS or GCP Security Command Center
Code: Python, TypeScript, JavaScript, Java, Go, Rust, C# DevOps/Config: Dockerfile, Jenkins/Groovy, JSON, Makefile, PowerShell, Shell, SQL, Terraform, TOML, YAML
file.py:42:10 Issue: Hardcoded database password detected Function: connect_db Type: HARDCODED_SECRET Severity: CRITICAL Suggestion: Move credentials to environment variables or a secrets manager
TypeSeverityActionVERY_HIGH_COMPLEXITYCRITICALFix immediatelyHIGH_COMPLEXITYHIGHFix in current sprintDEEP_NESTINGHIGHRefactor nesting levelsSQL_INJECTION_RISKHIGHParameterize queriesHARDCODED_SECRETCRITICALRemove and rotateLONG_FUNCTIONMEDIUMSplit function
# Fail build on HIGH or CRITICAL issues hefesto analyze /path/to/project --fail-on HIGH # Pre-push git hook hefesto install-hook # Limit output hefesto analyze /path/to/project --max-issues 10 # Exclude specific issue types hefesto analyze /path/to/project --exclude-types VERY_HIGH_COMPLEXITY,LONG_FUNCTION
TierPriceKey FeaturesFREE$0/moStatic analysis, 17 languages, pre-push hooksPRO$8/moML semantic analysis, REST API, BigQuery integration, custom rulesOMEGA$19/moIRIS monitoring, auto-correlation, real-time alerts, team dashboard All paid tiers include a 14-day free trial. See pricing and subscribe at hefestoai.narapallc.com. To activate a license, see the setup guide at hefestoai.narapallc.com/setup.
Created by Narapa LLC (Miami, FL) — Arturo Velasquez (@artvepa) GitHub: github.com/artvepa80/Agents-Hefesto Support: support@narapallc.com
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.