Autonomous Technical Debt Prevention & Architecture Intelligence Platform
ArchGuardian is a GoLang-based autonomous system that provides deep visibility into software architecture, identifies risks, fixes broken dependencies, updates libraries, and prevents technical debt from accumulating—automatically.
ArchGuardian performs three core functions with a deterministic, reliable architecture:
Creates a real-time knowledge graph showing how every component connects—code, APIs, databases, services, and data flows across your entire stack using static analysis, AST parsing, and pattern matching. Scans are fast, reproducible, and work offline.
2. Diagnoses Hidden Risks (Rule-Based Detection)
Surfaces technical debt, security vulnerabilities, obsolete code, and dangerous dependencies before they become critical failures using deterministic detection rules, CVE databases, and pattern matching. Every scan produces identical results.
When you select an issue, AI generates intelligent fix recommendations. You review the proposed solution, approve it, and ArchGuardian applies the fix. AI is only used for generating solutions, never for scanning or detection.
- Multi-Provider AI Support: Cerebras, Google Gemini, Anthropic Claude, OpenAI, DeepSeek
- Intelligent Context Management: Maintains conversation history and project context
- On-Demand Solution Generation: AI generates fixes only when you request them
- Smart Dependency Updates: Analyzes breaking changes before updating libraries
- Review-Before-Apply Workflow: You review and approve all AI-generated solutions
- Dynamic Architecture Mapping: Visualizes code structure, dependencies, and data flows
- Multi-Layer Analysis: Code → API → Database → Service relationships
- Interactive Visualization: Powered by Vis.js with real-time updates
- Semantic Search: Natural language queries over architecture data
- Historical Tracking: Compare architecture changes over time
- Go AST Analysis: Deep parsing of Go source code structure (no AI)
- Dependency Graph Construction: Maps all import relationships deterministically
- Test Coverage Analysis: Identifies untested code paths via coverage tools
- Security Vulnerability Detection: Pattern-based detection + CVE database lookups
- Code Quality Metrics: Cyclomatic complexity calculation, rule-based code smell detection
- Web Baseline Compatibility Checker: Validates CSS, JavaScript, and HTML features against web standards
- 100% Reproducible: Same codebase always produces identical scan results
- Offline Capable: Scans work without internet connectivity (except CVE updates)
- Schema Extraction: Parses ORM models and database schemas deterministically
- Query Pattern Detection: Identifies inefficient database access patterns via static analysis
- Migration Risk Assessment: Evaluates impact of schema changes using rule-based analysis
- Data Flow Tracking: Maps data movement across the system via AST parsing
- Real-Time System Metrics: CPU, memory, disk, network monitoring
- Process Inspection: Tracks running processes and resource usage
- Performance Profiling: Identifies bottlenecks and optimization opportunities
- Live Dependency Health: Monitors external service availability
- Chromem-go Integration: Embeddable vector database with semantic search
- Automatic Persistence: All scan results, issues, and graphs stored permanently
- Encrypted Backups: AES-GCM encryption for sensitive data
- S3/Cloud Storage: Optional cloud backup integration
- Historical Analysis: Query past scans and track trends
- Multi-Project Management: Track multiple codebases simultaneously
- Real-Time WebSocket Updates: Live scan progress and issue notifications
- Interactive Knowledge Graph: Explore architecture visually
- Issue Tracking: Prioritized list of security and quality issues
- Web Compatibility Reports: Browser compatibility warnings and recommendations
- Coverage Reports: Visual test coverage analysis
- System Monitoring: Real-time performance metrics
ArchGuardian uses a unified port architecture where all services are consolidated on port 3000 for simplified deployment and easier management.
graph TB
subgraph "Client Layer"
Browser[Web Browser]
CLI[CLI Tools]
end
subgraph "ArchGuardian Unified Server - Port 3000"
Dashboard[Dashboard UI<br/>HTML/CSS/JS]
Router[HTTP Router<br/>Gorilla Mux]
subgraph "API Layer"
ProjectAPI[Project API<br/>/api/v1/projects]
ScanAPI[Scan API<br/>/api/v1/scan]
DataAPI[Data API<br/>/api/v1/knowledge-graph<br/>/api/v1/issues<br/>/api/v1/coverage]
AuthAPI[Auth API<br/>/api/v1/auth]
MonitorAPI[Monitor API<br/>/api/v1/metrics<br/>/api/v1/integrations]
BackupAPI[Backup API<br/>/api/v1/backup]
SearchAPI[Search API<br/>/api/v1/search]
LogAPI[Log API<br/>/api/v1/logs]
end
WS[WebSocket Server<br/>/ws]
subgraph "Core Services"
Scanner[Code Scanner<br/>AST Analysis]
RiskDiag[Risk Diagnoser<br/>Security Analysis]
AIEngine[AI Inference Engine<br/>Multi-Provider]
DataEngine[Data Engine<br/>Metrics & Events]
AuthSvc[Auth Service<br/>GitHub OAuth]
end
end
subgraph "Storage Layer"
ChromemDB[(Chromem-go Vector DB<br/>./archguardian-data/)]
FileStore[File Storage<br/>Settings & Configs]
end
subgraph "External Services"
GitHub[GitHub API]
Kafka[Kafka<br/>Optional]
ChromaDB[ChromaDB<br/>Optional]
AIProviders[AI Providers<br/>Cerebras/Gemini/Claude<br/>OpenAI/DeepSeek]
end
Browser -->|HTTP/HTTPS| Dashboard
Browser -->|WebSocket| WS
CLI -->|REST API| Router
Dashboard --> Router
Router --> ProjectAPI
Router --> ScanAPI
Router --> DataAPI
Router --> AuthAPI
Router --> MonitorAPI
Router --> BackupAPI
Router --> SearchAPI
Router --> LogAPI
Router --> WS
ProjectAPI --> Scanner
ScanAPI --> Scanner
Scanner --> RiskDiag
Scanner --> DataEngine
RiskDiag -.->|User-Triggered Only| AIEngine
DataAPI --> DataEngine
AuthAPI --> AuthSvc
MonitorAPI --> DataEngine
BackupAPI --> ChromemDB
SearchAPI --> ChromemDB
LogAPI --> DataEngine
Scanner -->|Deterministic Results| ChromemDB
RiskDiag -->|Detected Issues| ChromemDB
DataEngine --> ChromemDB
AuthSvc --> FileStore
AuthSvc --> GitHub
DataEngine -.->|Optional| Kafka
DataEngine -.->|Optional| ChromaDB
AIEngine -.->|On-Demand Only| AIProviders
WS -.->|Real-time Updates| Browser
style Browser fill:#e1f5ff
style Dashboard fill:#fff4e1
style Router fill:#ffe1f5
style ChromemDB fill:#e1ffe1
style AIProviders fill:#f5e1ff
┌─────────────────────────────────────────────────────────────┐
│ Frontend Dashboard │
│ (Embedded HTML/CSS/JS) │
│ │
│ ┌─────────────┬──────────────┬──────────────┬────────────┐ │
│ │ Projects │ Knowledge │ Issues │ Monitoring │ │
│ │ Management │ Graph View │ & Coverage │ Dashboard │ │
│ └─────────────┴──────────────┴──────────────┴────────────┘ │
└─────────────────────────────────────────────────────────────┘
│
┌─────────┴─────────┐
│ HTTP + WebSocket │
└─────────┬─────────┘
│
┌─────────────────────────────▼─────────────────────────────────┐
│ UNIFIED SERVER - PORT 3000 │
│ │
│ ┌──────────────────────────────────────────────────────────┐ │
│ │ REST API Layer │ │
│ │ /api/v1/projects │ /api/v1/scan │ /api/v1/auth │ │
│ │ /api/v1/issues │ /api/v1/coverage │ /api/v1/metrics│ │
│ │ /api/v1/search │ /api/v1/backup │ /api/v1/logs │ │
│ └──────────────────────────────────────────────────────────┘ │
│ │ │
│ ┌──────────────────────────▼──────────────────────────────┐ │
│ │ Core Services │ │
│ │ │ │
│ │ ┌──────────┐ ┌──────────┐ ┌──────────┐ ┌─────────┐ │ │
│ │ │ Scanner │ │ Risk │ │ AI │ │ Data │ │ │
│ │ │ (AST) │→ │ Diagnoser│ │Remediation│ │ Engine │ │ │
│ │ │Determ. │ │Determ. │ │User-Trig. │ │ │ │ │
│ │ └──────────┘ └──────────┘ └──────────┘ └─────────┘ │ │
│ │ │ │ ↑ │ │ │
│ │ │ │ │ │ │ │
│ │ │ └──────────────┘ │ │ │
│ │ │ (User selects issue) │ │ │
│ └───────┼──────────────┼──────────────────────────┼───────┘ │
│ │ │ │ │
└──────────┼──────────────┼───────────────────────────┼───────────┘
│ │ │
└──────────────┴───────────────────────────┘
│
┌──────────────────▼──────────────────┐
│ Chromem-go Vector Database │
│ (Persistent Storage + Search) │
│ ./archguardian-data/ │
│ │
│ Collections: │
│ • projects │
│ • knowledge-graphs │
│ • security-issues │
│ • test-coverage │
│ • scan-history │
│ • settings-history │
│ • remediation-logs │
└─────────────────────────────────────┘
✅ Simplified Deployment - Single port to expose (3000)
✅ Easier Firewall Configuration - Only one port to allow
✅ No CORS Issues - All APIs on same origin
✅ Simplified Load Balancing - Single endpoint to balance
✅ Better Resource Management - Shared connection pool
✅ Easier Container Deployment - Single port mapping in Docker
✅ Consistent API Base URL - All endpoints under http://localhost:3000
- Unified HTTP Router - Gorilla Mux handling all routes
- Project Management - Multi-project orchestration
- Authentication System - GitHub OAuth with JWT
- Scan Coordination - Triggers and manages scan lifecycle
- Settings Management - Configuration hot-reload
- Dashboard Serving - Embedded HTML/CSS/JS resources
- WebSocket Server - Real-time event streaming
- API Gateway - Routes to all internal services
- Go AST Parsing - Deep source code analysis (deterministic)
- Dependency Graph - Import relationship mapping (deterministic)
- Test Coverage - Coverage report generation (deterministic)
- Knowledge Graph - Architecture visualization data (deterministic)
- File System Analysis - Project structure scanning (deterministic)
- Web Baseline Checker - CSS/JS/HTML compatibility validation (deterministic)
- No AI Inference - All scanning is rule-based and reproducible
- Security Vulnerability Detection - Pattern matching for SQL injection, XSS, etc. (deterministic)
- Code Quality Analysis - Cyclomatic complexity calculation, rule-based code smell detection (deterministic)
- Technical Debt Identification - Deprecated code detection, TODO extraction (deterministic)
- Compatibility Analysis - Browser compatibility warnings (deterministic)
- Risk Scoring - Priority-based issue ranking (deterministic)
- CVE Database Lookups - Dependency vulnerability checking via external databases
- No AI Inference - All detection is pattern-based and reproducible
- User-Triggered Only - AI is invoked only when user requests a solution
- Multi-Provider Orchestration - Cerebras, Gemini, Claude, OpenAI, DeepSeek
- Context Management - Maintains conversation history
- Solution Generation - AI generates fix recommendations for detected issues
- Review Workflow - User reviews and approves solutions before application
- Conversation Memory - Persistent chat history
- Provider Fallback - Automatic failover between AI providers
- Separate from Scanning - AI never runs during the scanning phase
- Real-time Metrics Collection - CPU, memory, disk, network
- Event Streaming - Kafka integration (optional)
- WebSocket Management - Live update broadcasting
- REST API - Data access endpoints
- Chromem-go Integration - Vector database management
- Alert System - Threshold-based notifications
- Analytics - Trend analysis and reporting
- Go 1.23.3+ installed
- Git for version control
- AI Provider API Key (at least one):
- Cerebras API key
- Google Gemini API key
- Anthropic API key
- OpenAI API key
- DeepSeek API key
-
Clone the repository
git clone https://github.com/guiperry/archguardian.git cd archguardian -
Install dependencies
go mod download
-
Configure environment variables
cp .env.example .env # Edit .env with your API keys and settingsRequired variables:
# AI Provider (choose at least one) CEREBRAS_API_KEY=your_cerebras_key GEMINI_API_KEY=your_gemini_key ANTHROPIC_API_KEY=your_anthropic_key OPENAI_API_KEY=your_openai_key DEEPSEEK_API_KEY=your_deepseek_key # GitHub Integration (optional) GITHUB_TOKEN=your_github_token GITHUB_CLIENT_ID=your_oauth_client_id GITHUB_CLIENT_SECRET=your_oauth_client_secret # Project Configuration PROJECT_PATH=/path/to/your/project # Server Configuration (Unified Port Architecture) PORT=3000 # All services consolidated on port 3000 # Session Secret SESSION_SECRET=your_random_secret_key
-
Run ArchGuardian
go run main.go
-
Access the dashboard
Open your browser to: http://localhost:3000
- Navigate to the dashboard at
http://localhost:3000 - Click "Add Project"
- Enter project name and path
- Click "Save"
- Select a project from the project list
- Click "Scan Project"
- Monitor real-time progress via WebSocket updates
- View results in the Knowledge Graph, Issues, and Coverage tabs
- Interactive visualization of code architecture
- Nodes represent files, functions, types, and dependencies
- Edges show relationships (imports, calls, data flows)
- Click nodes to see details
- Use semantic search: "Find all database queries"
- Prioritized list of security vulnerabilities
- Code quality issues and technical debt
- Click issues to see file location and suggested fixes
- Filter by severity: Critical, High, Medium, Low
- Visual test coverage report
- File-by-file coverage percentages
- Identify untested code paths
- Track coverage trends over time
- Real-time system metrics (CPU, memory, disk, network)
- Integration health status (GitHub, Kafka, ChromaDB)
- Performance trends and alerts
- Navigate to the Issues tab
- Select an issue
- Click "Generate Fix"
- Review the AI-generated patch
- Click "Apply Fix" to automatically remediate
Query your codebase using natural language:
"Find all SQL injection vulnerabilities"
"Show authentication-related code"
"List all deprecated dependencies"
"Find functions with high cyclomatic complexity"
ArchGuardian includes an integrated Web Baseline Compatibility Checker that validates your web code against the Web Platform Baseline standards to ensure cross-browser compatibility.
The Baseline Checker automatically scans your web assets and identifies:
- CSS Properties: Detects non-baseline CSS properties that may not be supported across all browsers
- JavaScript APIs: Identifies browser APIs that aren't part of the baseline standard
- HTML Elements: Flags HTML elements that may have limited browser support
- HTML Attributes: Checks for non-standard or experimental HTML attributes
- Automatic Updates: The checker fetches the latest baseline features from the web-features repository every 24 hours
- On-Demand Loading: Features are loaded lazily when you start a project scan to avoid unnecessary network calls during startup
- Real-Time Scanning: During each scan cycle, ArchGuardian analyzes:
.cssfiles for CSS property usage.jsand.tsfiles for JavaScript API usage.htmlfiles for HTML elements and attributes
Compatibility issues are displayed in the dashboard under the Issues tab:
- Navigate to the Issues view in the dashboard
- Click on the Web Compatibility tab
- Review the list of compatibility warnings with:
- Feature Name: The specific CSS property, JS API, or HTML element
- Location: File path where the feature is used
- Severity: Risk level (typically "low" for compatibility issues)
- Remediation: Recommendations including MDN documentation links
ID: COMPAT-css-backdrop-filter
Location: /styles/main.css
Type: compatibility
Severity: low
Description: Usage of non-Baseline CSS Property: 'backdrop-filter'
Remediation: This feature may not be supported in all browsers. Consider
replacing it with a widely-supported alternative or adding fallbacks/polyfills.
See MDN for details: https://developer.mozilla.org/en-US/search?q=backdrop-filter
The baseline checker runs automatically during scans. To start baseline updates at application initialization (useful for testing):
START_BASELINE_ON_INIT=trueBy default, this is false to avoid network calls during startup.
The baseline checker uses the official Web Platform Baseline dataset, which is maintained by the Web Platform DX Community Group and includes features that are:
- Widely available across major browsers
- Stable and unlikely to change
- Safe to use in production without polyfills
ArchGuardian automatically selects the best AI provider based on availability and task type. Configure preferences in .env:
# Primary provider for code analysis
PRIMARY_AI_PROVIDER=cerebras
# Fallback providers (comma-separated)
FALLBACK_AI_PROVIDERS=gemini,anthropic,openaiCustomize scan behavior in the dashboard Settings tab:
- Scan Depth: Shallow, Medium, Deep
- Include Tests: Scan test files
- Include Vendor: Scan vendor dependencies
- Parallel Scans: Number of concurrent file scans
- AI Analysis: Enable/disable AI-powered analysis
Chromem-go database settings:
# Database path
CHROMEM_DB_PATH=./archguardian-data
# Enable compression
CHROMEM_COMPRESSION=true
# Backup schedule (cron format)
BACKUP_SCHEDULE=0 2 * * * # Daily at 2 AM
# S3 backup (optional)
S3_BUCKET=archguardian-backups
S3_REGION=us-east-1
AWS_ACCESS_KEY_ID=your_key
AWS_SECRET_ACCESS_KEY=your_secretBased on the comprehensive gap analysis, ArchGuardian has completed all major implementation phases:
- Project struct and in-memory storage
-
/api/v1/projectsendpoints (GET, POST, DELETE) -
/api/v1/projects/{id}/scanendpoint - Connected
handleKnowledgeGraphto real scanner data - Connected
handleIssuesto real RiskDiagnoser output - Connected
handleCoverageto real test coverage results - Added missing WebSocket message types
- Standardized WebSocket message format
- Initialized
chromem.NewPersistentDBin main.go - Created collections for projects, scans, issues, coverage
- Implemented data serialization to chromem.Document format
- Updated scanner to persist knowledge graphs after each scan
- Updated RiskDiagnoser to persist issues to chromem-go
- Updated coverage scanner to persist results
- Implemented scan history retrieval endpoints
- Added semantic search endpoints for natural language queries
- Implemented export/import for database backups
- OPTIONAL: Scheduled backup to S3/cloud storage
- Implemented GitHub OAuth flow
- Added session management
- Protected API endpoints
- Added
/api/v1/auth/*endpoints - Implemented token refresh
- Added user management
- Implemented settings persistence
- Added configuration hot-reload
- Implemented settings validation
- Updated services when settings change
- Added environment-specific configs
- Implemented secrets management
- Added integration health checks
- Implemented
/api/v1/integrations/status - Exposed real-time system metrics
- Added alert configuration
- Implemented notification system
- Added real-data to monitoring dashboards
- Consolidated API ports
- Added comprehensive error handling
- Implemented rate limiting
- Added API documentation
- Performance optimization
- Security audit
go test ./...go test -tags=integration ./...go test -cover ./...- Add project via UI
- Trigger scan and verify results
- View knowledge graph with real data
- View issues with real data
- View coverage with real data
- Save settings and verify persistence
- GitHub authentication flow
- WebSocket real-time updates
- Integration status monitoring
Base URL: http://localhost:3000
All endpoints are served from the unified server on port 3000. Full OpenAPI documentation available at /api/docs.
GET /health- Health check endpoint- Returns:
{ status: "healthy", timestamp: "...", version: "1.0.0" }
- Returns:
GET /api/v1/projects- List all projects- Returns: Array of project objects with id, name, path, status, lastScan, issueCount
POST /api/v1/projects- Create new project- Body:
{ name: "string", path: "string" } - Returns: 201 Created with project object
- Body:
GET /api/v1/projects/{id}- Get specific project details- Returns: Project object
DELETE /api/v1/projects/{id}- Delete project- Returns: 200 OK on success
POST /api/v1/projects/{id}/scan- Trigger scan for specific project- Returns:
{ status: "ok", message: "Scan triggered successfully" }
- Returns:
POST /api/v1/scan/start- Start comprehensive scan- Returns:
{ status: "ok", message: "Scan triggered successfully" } - Error: 503 if scan already in progress
- Returns:
GET /api/v1/knowledge-graph- Get knowledge graph visualization data- Returns:
{ nodes: [...], edges: [...] } - Requires: Bearer token authentication
- Returns:
GET /api/v1/issues- Get detected security and quality issues- Query params:
?type=security|technical-debt|obsolete|dependencies - Returns: Array of issue objects
- Requires: Bearer token authentication
- Query params:
GET /api/v1/coverage- Get test coverage metrics- Returns:
{ overall_coverage: 0.75, lines_covered: 1500, total_lines: 2000, ... } - Requires: Bearer token authentication
- Returns:
GET /api/v1/search- Natural language search across codebase- Query params:
q(required): Search querycollection(optional): Collection to search (default: "knowledge-graphs")limit(optional): Max results (default: 5, max: 20)
- Returns:
{ query: "...", collection: "...", total: 10, results: [...] } - Requires: Bearer token authentication
- Query params:
GET /api/v1/auth/github- Initiate GitHub OAuth flow- Redirects to GitHub authorization page
GET /api/v1/auth/github/callback- OAuth callback handler- Handles GitHub OAuth response
POST /api/v1/auth/github- Exchange authorization code for token- Body:
{ code: "github_auth_code" } - Returns:
{ success: true, token: "jwt_token", user: {...} }
- Body:
GET /api/v1/auth/github/status- Check authentication status- Returns:
{ authenticated: true, user: {...} }
- Returns:
POST /api/v1/auth/logout- Logout current user- Returns:
{ success: true }
- Returns:
GET /api/v1/settings- Get current configuration- Returns: Configuration object
- Requires: Bearer token authentication
POST /api/v1/settings- Update configuration- Body: Configuration object
- Returns:
{ success: true, message: "Settings updated" } - Requires: Bearer token authentication
GET /api/v1/integrations/status- Get integration health status- Returns:
{ github: {...}, kafka: {...}, chromadb: {...}, data_engine: {...}, timestamp: "..." }
- Returns:
GET /api/v1/metrics- Get real-time system metrics- Returns:
{ cpu: 45.2, memory: 62.1, disk: 78.5, network: { in: 1024, out: 2048 }, processes: 150, timestamp: "..." }
- Returns:
POST /api/v1/backup- Create database backup- Body (optional):
{ encryption_key: "32-byte-key" } - Returns:
{ success: true, backup_path: "...", timestamp: "...", encrypted: true, size_bytes: 1024000 } - Requires: Bearer token authentication
- Body (optional):
GET /api/v1/backup- List available backups- Returns:
{ backups: [...], total: 5, directory: "..." } - Requires: Bearer token authentication
- Returns:
POST /api/v1/logs- Ingest log messages- Body:
{ level: "info", message: "...", timestamp: "...", metadata: {...} } - Returns:
{ success: true, message: "Log ingested" }
- Body:
GET /api/v1/logs/batch- Get batch log statistics- Returns: Batch processing statistics
GET /api/docs- OpenAPI 3.0 specification (JSON)- Returns: Complete API documentation in OpenAPI format
WebSocket URL: ws://localhost:3000/ws
Connect to the WebSocket endpoint for real-time updates during scans and system events:
{
"type": "scan_started",
"data": {
"project_id": "proj-123",
"scan_id": "scan-456",
"timestamp": "2025-01-15T10:30:00Z"
}
}{
"type": "scan_progress",
"data": {
"scan_id": "scan-456",
"progress": 45,
"current_file": "main.go",
"files_scanned": 23,
"total_files": 51
}
}{
"type": "scan_completed",
"data": {
"scan_id": "scan-456",
"duration_ms": 12450,
"issues_found": 7,
"coverage": 0.78
}
}{
"type": "security_vulnerability",
"data": {
"severity": "critical",
"type": "sql_injection",
"file": "handlers/user.go",
"line": 45,
"message": "Potential SQL injection vulnerability"
}
}{
"type": "remediation_applied",
"data": {
"issue_id": "issue-789",
"file": "handlers/user.go",
"patch": "...",
"success": true
}
}- Go 1.23.3 - Core language
- Gorilla Mux - HTTP routing
- Gorilla WebSocket - Real-time communication
- Gorilla Sessions - Session management
- Chromem-go - Embeddable vector database
- gopsutil - System metrics collection
- Kafka - Event streaming (optional)
- Cerebras - Ultra-fast inference
- Google Gemini - Advanced reasoning
- Anthropic Claude - Code analysis
- OpenAI - General purpose
- DeepSeek - Code understanding
- Vanilla JavaScript (ES6+) - No framework overhead
- Chart.js - Data visualization
- Vis.js - Knowledge graph rendering
- WebSocket API - Real-time updates
- File System Access API - Folder selection
- Chromem-go - Vector database with semantic search
- Gob encoding - Efficient binary serialization
- Gzip compression - Storage optimization
- AES-GCM encryption - Backup security
Contributions are welcome! Please follow these guidelines:
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature) - Commit your changes (
git commit -m 'Add amazing feature') - Push to the branch (
git push origin feature/amazing-feature) - Open a Pull Request
# Install development dependencies
go install golang.org/x/tools/cmd/goimports@latest
go install github.com/golangci/golangci-lint/cmd/golangci-lint@latest
# Run linter
golangci-lint run
# Format code
goimports -w .This project is licensed under the MIT License - see the LICENSE file for details.
- Chromem-go by Philippe Gille - Embeddable vector database
- Gorilla Toolkit - Excellent Go web libraries
- Vis.js - Beautiful network visualizations
- Chart.js - Powerful charting library
- All AI provider teams for their amazing APIs
- Disclosure: Vulnerability Disclosure
- Documentation: Full documentation
- Issues: GitHub Issues
- Multi-language Support: Python, JavaScript, TypeScript, Java
- CI/CD Integration: GitHub Actions, GitLab CI, Jenkins plugins
- Slack/Discord Notifications: Real-time alerts
- Custom Rule Engine: Define your own code quality rules
- Team Collaboration: Multi-user support with role-based access
- Cloud Deployment: Docker, Kubernetes, AWS/GCP/Azure templates
- Advanced Analytics: ML-powered trend prediction
- IDE Plugins: VSCode, IntelliJ, Vim extensions
ArchGuardian is designed for performance:
- Parallel Scanning: Utilizes all CPU cores
- Incremental Analysis: Only scans changed files
- Efficient Storage: Chromem-go with gzip compression
- Low Memory Footprint: Streaming analysis for large codebases
- Fast Queries: Vector database semantic search in milliseconds
Benchmark Results (on a typical Go project with 10,000 files):
- Initial scan: ~2-3 minutes
- Incremental scan: ~10-30 seconds
- Knowledge graph query: <100ms
- Semantic search: <200ms
Built with ❤️ by the KNIRV NETWORK Team
Preventing technical debt, one commit at a time.