Use this file to discover all available pages before exploring further.
This reference is generated automatically. Last updated: May 15, 2026
CodeRabbit supports integration with 51 static analysis tools, linters, and security scanners. You can configure each tool individually via the web interface or your .coderabbit.yaml file, see the configuration overview for details.
Enable Biome | Biome is a fast formatter, linter, and analyzer for web projects. | Enable Biome integration. | v2.4.15Defaults to true.
Example configuration:
.coderabbit.yaml
reviews: tools: biome: enabled: true
Blinter
Blinter is a linter for Windows batch files that provides comprehensive static analysis to identify syntax errors, security vulnerabilities, performance issues, and style problems.
Enable Blinter | Blinter is a linter for Windows batch files that provides comprehensive static analysis to identify syntax errors, security vulnerabilities, performance issues, and style problems. | v1.0.112Defaults to true.
Example configuration:
.coderabbit.yaml
reviews: tools: blinter: enabled: true
Brakeman
Brakeman is a static analysis security vulnerability scanner for Ruby on Rails applications. | v8.0.3
Enable dotenv-linter | dotenv-linter is a tool for checking and fixing .env files for problems and best practices | v4.0.0Defaults to true.
Example configuration:
.coderabbit.yaml
reviews: tools: dotenvLint: enabled: true
Ember Template Lint
ember-template-lint is a linter for Handlebars template files that checks for common issues such as accessibility violations, deprecated patterns, and template anti-patterns.
Enable ember-template-lint | ember-template-lint is a linter for Handlebars template files that checks for common issues such as accessibility violations, deprecated patterns, and template anti-patterns. | v7.9.3Defaults to true.
Example configuration:
.coderabbit.yaml
reviews: tools: emberTemplateLint: enabled: true
ESLint
ESLint is a static code analysis tool for JavaScript files.
Optional path to the golangci-lint configuration file relative to the repository. Useful when the configuration file is named differently than the default ‘.golangci.yml’, ‘.golangci.yaml’, ‘.golangci.toml’, ‘.golangci.json’.
If set to ‘picky’, additional rules will be activated, i.e. rules that you might only find useful when checking formal text.One of: default, pickyDefaults to default.
Enable markdownlint | markdownlint-cli2 is a static analysis tool to enforce standards and consistency for Markdown files. | Enable markdownlint integration. | v0.22.1Defaults to true.
Example configuration:
.coderabbit.yaml
reviews: tools: markdownlint: enabled: true
OpenGrep
OpenGrep is a high-performance static code analysis engine, compatible with Semgrep configurations.
Enable OpenGrep | OpenGrep is a high-performance static code analysis engine for finding security vulnerabilities and bugs across 17+ languages. | v1.20.0Defaults to true.
Example configuration:
.coderabbit.yaml
reviews: tools: opengrep: enabled: true
OSV Scanner
OSV Scanner is a tool for vulnerability package scanning.
Enable PHPStan | PHPStan requires config file in your repository root. Please ensure that this file contains the paths: parameter. | v2.1.54Defaults to true.
Level | Specify the rule level to run. When set to default, the level is determined by the review profile: chill uses level 3 (real bugs only — return/property type mismatches, array offset errors) and assertive uses level 8 (adds dead code detection, argument type checking, null safety, and typehint checks). This setting is ignored if your configuration file already has a level: parameter.One of: default, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, maxDefaults to default.
Microsoft Presidio Analyzer 2.2.362 detects sensitive identifiers (including payment cards, US SSN, cryptocurrency wallets, and phone numbers) in changed files. Tune entities, thresholds, and languages in repository Presidio configuration (for example .presidiocli or AnalyzerEngineProvider YAML); the built-in scan uses fixed defaults and is skipped when that configuration is present.
Enable Semgrep | Semgrep is a static analysis tool designed to scan code for security vulnerabilities and code quality issues. | Enable Semgrep integration. | v1.162.0Defaults to true.
Enable Shopify Theme Check | A linter for Shopify themes that helps you follow Shopify theme & Liquid best practices | cli 3.90.0 | theme 3.58.2Defaults to true.
Example configuration:
.coderabbit.yaml
reviews: tools: shopifyThemeCheck: enabled: true
Smarty Lint
smarty-lint is a linter for Smarty 3 template files that checks for common issues such as incorrect operator usage, naming conventions, empty blocks, and unquoted strings.
Enable smarty-lint | smarty-lint is a linter for Smarty 3 template files that checks for common issues such as incorrect operator usage, naming conventions, empty blocks, and unquoted strings. | v0.3.3Defaults to true.
Example configuration:
.coderabbit.yaml
reviews: tools: smartyLint: enabled: true
SQLFluff
SQLFluff is an open source, dialect-flexible and configurable SQL linter.
Optional path to the SQLFluff configuration file relative to the repository. Use this when the config file is not named one of SQLFluff’s default filenames.
Enable Stylelint | Stylelint is a linter for stylesheets (CSS, SCSS, Sass, Less, SugarSS, Stylus) that helps avoid errors and enforce conventions. | Enable Stylelint integration. | v17.11.0Defaults to true.
Optional path to the SwiftLint configuration file relative to the repository. This is useful when the configuration file is named differently than the default ‘.swiftlint.yml’ or ‘.swiftlint.yaml’.