Use this file to discover all available pages before exploring further.
This reference is automatically generated from the CodeRabbit tools schema.
Last updated: 2026-05-05
CodeRabbit supports integration with 51 static analysis tools, linters, and security scanners. Each tool can be configured individually within your .coderabbit.yaml file.
Enable actionlint | actionlint is a static checker for GitHub Actions workflow files. | v1.7.12Defaults to true.
Example configuration:
reviews: tools: actionlint: enabled: true
Ast-grep
Enable ast-grep | ast-grep is a code analysis tool that helps you to find patterns in your codebase using abstract syntax trees patterns. | v0.42.1Configuration options:
Enable Biome | Biome is a fast formatter, linter, and analyzer for web projects. | Enable Biome integration. | v2.4.14Defaults to true.
Example configuration:
reviews: tools: biome: enabled: true
Blinter
Blinter is a linter for Windows batch files that provides comprehensive static analysis to identify syntax errors, security vulnerabilities, performance issues, and style problems.Configuration options:
Enable Blinter | Blinter is a linter for Windows batch files that provides comprehensive static analysis to identify syntax errors, security vulnerabilities, performance issues, and style problems. | v1.0.112Defaults to true.
Example configuration:
reviews: tools: blinter: enabled: true
Brakeman
Brakeman is a static analysis security vulnerability scanner for Ruby on Rails applications. | v8.0.3Configuration options:
Enable dotenv-linter | dotenv-linter is a tool for checking and fixing .env files for problems and best practices | v4.0.0Defaults to true.
Example configuration:
reviews: tools: dotenvLint: enabled: true
Ember Template Lint
ember-template-lint is a linter for Handlebars template files that checks for common issues such as accessibility violations, deprecated patterns, and template anti-patterns.Configuration options:
Enable ember-template-lint | ember-template-lint is a linter for Handlebars template files that checks for common issues such as accessibility violations, deprecated patterns, and template anti-patterns. | v7.9.3Defaults to true.
Example configuration:
reviews: tools: emberTemplateLint: enabled: true
Eslint
ESLint is a static code analysis tool for JavaScript files.Configuration options:
Optional path to the golangci-lint configuration file relative to the repository. Useful when the configuration file is named differently than the default ‘.golangci.yml’, ‘.golangci.yaml’, ‘.golangci.toml’, ‘.golangci.json’.
If set to ‘picky’, additional rules will be activated, i.e. rules that you might only find useful when checking formal text.One of: default, pickyDefaults to default.
Enable markdownlint | markdownlint-cli2 is a static analysis tool to enforce standards and consistency for Markdown files. | Enable markdownlint integration. | v0.22.1Defaults to true.
Example configuration:
reviews: tools: markdownlint: enabled: true
Opengrep
OpenGrep is a high-performance static code analysis engine, compatible with Semgrep configurations.Configuration options:
Enable OpenGrep | OpenGrep is a high-performance static code analysis engine for finding security vulnerabilities and bugs across 17+ languages. | v1.20.0Defaults to true.
Example configuration:
reviews: tools: opengrep: enabled: true
Osv Scanner
OSV Scanner is a tool for vulnerability package scanning.Configuration options:
Enable PHPStan | PHPStan requires config file in your repository root. Please ensure that this file contains the paths: parameter. | v2.1.54Defaults to true.
Level | Specify the rule level to run. When set to default, the level is determined by the review profile: chill uses level 3 (real bugs only — return/property type mismatches, array offset errors) and assertive uses level 8 (adds dead code detection, argument type checking, null safety, and typehint checks). This setting is ignored if your configuration file already has a level: parameter.One of: default, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, maxDefaults to default.
Microsoft Presidio Analyzer 2.2.362 detects sensitive identifiers (including payment cards, US SSN, cryptocurrency wallets, and phone numbers) in changed files. Tune entities, thresholds, and languages in repository Presidio configuration (for example .presidiocli or AnalyzerEngineProvider YAML); the built-in scan uses fixed defaults and is skipped when that configuration is present.Configuration options:
Enable Semgrep | Semgrep is a static analysis tool designed to scan code for security vulnerabilities and code quality issues. | Enable Semgrep integration. | v1.161.0Defaults to true.
Enable Shopify Theme Check | A linter for Shopify themes that helps you follow Shopify theme & Liquid best practices | cli 3.90.0 | theme 3.58.2Defaults to true.
Example configuration:
reviews: tools: shopifyThemeCheck: enabled: true
Smarty Lint
smarty-lint is a linter for Smarty 3 template files that checks for common issues such as incorrect operator usage, naming conventions, empty blocks, and unquoted strings.Configuration options:
Enable smarty-lint | smarty-lint is a linter for Smarty 3 template files that checks for common issues such as incorrect operator usage, naming conventions, empty blocks, and unquoted strings. | v0.3.3Defaults to true.
Example configuration:
reviews: tools: smartyLint: enabled: true
Sqlfluff
SQLFluff is an open source, dialect-flexible and configurable SQL linter.Configuration options:
Optional path to the SQLFluff configuration file relative to the repository. Use this when the config file is not named one of SQLFluff’s default filenames.
Enable Stylelint | Stylelint is a linter for stylesheets (CSS, SCSS, Sass, Less, SugarSS, Stylus) that helps avoid errors and enforce conventions. | Enable Stylelint integration. | v17.10.0Defaults to true.
Optional path to the SwiftLint configuration file relative to the repository. This is useful when the configuration file is named differently than the default ‘.swiftlint.yml’ or ‘.swiftlint.yaml’.