Comprehensive developer toolkit providing reusable skills for Java/Spring Boot, TypeScript/NestJS/React/Next.js, Python, PHP, AWS CloudFormation, AI/RAG, DevOps, and more.
90
90%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Risky
Do not use without reviewing
Optimized context for LLM agents to select the right MCP tool, map parameters, and interpret responses efficiently.
User wants to...
├── check if code is ready to merge/deploy
│ └── get_project_quality_gate_status (projectKey + pullRequest)
│
├── find issues in a project or PR
│ └── search_sonar_issues_in_projects (projects + severities + pullRequestId)
│
├── analyze code before committing
│ └── analyze_code_snippet (projectKey + fileContent + language)
│
├── understand why a rule flagged code
│ └── show_rule (key: "<language>:<rule-id>")
│
├── get project health metrics (coverage, bugs, etc.)
│ └── get_component_measures (projectKey + metricKeys)
│
└── accept or dismiss a specific issue
└── change_sonar_issue_status (key + status + comment)Purpose: Verify if a project passes its defined quality gate.
Required: one of projectKey, projectId, or analysisId
Optional: pullRequest (string, PR number as string)
Note: No
branchparameter exists on this tool. WithoutpullRequestoranalysisId, the default branch status is returned.
Key output fields:
projectStatus.status — "OK" or "ERROR" (or "WARN" in older versions)projectStatus.conditions[] — array of conditions, each with metricKey, status, actualValue, errorThreshold, comparatorWhen to use: Before merge decisions, deployment gates, release checks.
Purpose: Find and filter issues across projects.
All parameters optional — omit projects to search all accessible projects.
Key parameters:
projects — ["project-key-1", "project-key-2"]severities — ["BLOCKER", "HIGH", "MEDIUM", "LOW", "INFO"]pullRequestId — string (PR number), not integerp — page number (start at 1)ps — page size (default: 100, max: 500)Key output fields per issue:
key — unique issue ID (used in change_sonar_issue_status)rule — rule key (used in show_rule); note: field is named ruleKey in analyze_code_snippet responsesseverity — legacy severity valuestatus — current issue status (display only; use change_sonar_issue_status to change it)message — human-readable descriptionattribute — clean code attributecategory — SECURITY, RELIABILITY, MAINTAINABILITYcomponent — file path within the projectstartLine, endLine — location in the filePagination: Check paging.total and paging.pageSize in response; iterate p while paging.pageIndex * paging.pageSize < paging.total.
When to use: Issue triage, PR review, sprint cleanup, security audits.
Purpose: Run SonarQube analysis on a raw code string without CI.
Required: projectKey, fileContent (full file content as string)
Optional: language (always specify for best accuracy), codeSnippet (narrow results to a sub-range of the file)
Language values: javascript, typescript, python, java, go, php, cs (C#), cpp, kotlin, ruby, scala, swift
Key output fields per issue:
ruleKey — use with show_rule for explanation (note: rule in search_sonar_issues_in_projects, ruleKey here)severity — issue severitycleanCodeAttribute — clean code attributeimpacts — object mapping quality dimension to severity levelstartLine — line number in the filequickFixes — boolean, whether a quick fix is availableLimitations:
When to use: Shift-left review, pre-commit checks, code review assistance.
Purpose: Retrieve full documentation for a SonarQube rule.
Required: key in format <language>:<rule-id>
Language prefixes: java, javascript, typescript, python, go, php, cs, cpp, kotlin, ruby
Examples: java:S2068, typescript:S1082, python:S5659, go:S4036
Key output fields:
name — human-readable rule nametype — BUG, VULNERABILITY, CODE_SMELL, SECURITY_HOTSPOTseverity — legacy severitydescription — full explanation of the risk and rationaletags — standards: cwe, owasp-a1, sans-top25, certremediationEffort — time estimate for fix (e.g., "30min")codeExamples — array with noncompliant and compliant code examplesWhen to use: After finding an unfamiliar rule key, before dismissing an issue, for developer education.
Purpose: Retrieve specific metrics for a project, directory, or file.
Required: projectKey (project key), metricKeys (array)
Optional: pullRequest (string, for PR-scoped metrics)
Note: No
branchparameter exists on this tool.
Common metric key groups:
Overall health: bugs, vulnerabilities, code_smells, coverage, duplicated_lines_density, ncloc
Ratings: reliability_rating, security_rating, sqale_rating
New code only: new_bugs, new_vulnerabilities, new_coverage, new_duplicated_lines_density
Complexity: complexity, cognitive_complexity
When to use: Project health dashboards, sprint reviews, release readiness checks.
Purpose: Update the status of a specific issue.
Required: key (issue key from search_sonar_issues_in_projects response field key), status
Valid status values: falsepositive, accept, reopen
Optional: comment (strongly recommended — always document the reason)
Requires: SonarQube user permissions to change issue status.
When to use: Issue triage sign-off, false positive management, technical debt acknowledgment.
Never call this tool without explicit user confirmation and a documented reason.
1. get_project_quality_gate_status (projectKey, pullRequest)
2. If status == "ERROR":
a. search_sonar_issues_in_projects (projects, pullRequestId)
b. Group by category, present to user
c. For unfamiliar rules: show_rule (key)1. analyze_code_snippet (projectKey, fileContent, language)
2. For each finding:
a. show_rule (ruleKey) if severity >= HIGH or rule is unfamiliar
3. Present findings, propose fixes
4. Wait for user to apply fixes before commit1. search_sonar_issues_in_projects (projects, severities: ["BLOCKER"])
2. For each BLOCKER: show_rule (rule) to get remediation
3. Repeat for HIGH, MEDIUM
4. get_component_measures (projectKey, metricKeys: [...ratings]) for overall health1. get_project_quality_gate_status (projectKey)
2. get_component_measures (projectKey, metricKeys: ["bugs", "vulnerabilities", "coverage"])
3. Report combined gate + metrics summary| User Says | Tool | Key Parameter |
|---|---|---|
| "project my-app" | any | projectKey: "my-app" |
| "PR #234" | quality gate / search | pullRequest: "234" / pullRequestId: "234" |
| "on main branch" | quality gate | no branch param; omit pullRequest to get default branch |
| "critical issues" | search | severities: ["BLOCKER", "HIGH"] |
| "rule java:S2068" | show_rule | key: "java:S2068" |
| "issue AY1234" | change_status | key: "AY1234" |
| "TypeScript code" | analyze_snippet | language: "typescript" |
| "mark as false positive" | change_status | status: "falsepositive" |
| "accept as debt" | change_status | status: "accept" |
| Feature | SonarQube Server | SonarCloud |
|---|---|---|
| Project key format | Usually short slug | <org>_<repo> (e.g., my-org_my-repo) |
| PR analysis | Supported | Supported |
| Organization parameter | Not applicable | Required for some APIs |
analysisId | Available | Available |
| Branch analysis | Supported | Supported |
If the user's project key contains an underscore and appears to follow org_repo format, it is likely a SonarCloud project.
docs
plugins
developer-kit-ai
developer-kit-aws
agents
docs
skills
aws
aws-cli-beast
aws-cost-optimization
aws-drawio-architecture-diagrams
aws-sam-bootstrap
aws-cloudformation
aws-cloudformation-auto-scaling
aws-cloudformation-bedrock
aws-cloudformation-cloudfront
aws-cloudformation-cloudwatch
aws-cloudformation-dynamodb
aws-cloudformation-ec2
aws-cloudformation-ecs
aws-cloudformation-elasticache
references
aws-cloudformation-iam
references
aws-cloudformation-lambda
aws-cloudformation-rds
aws-cloudformation-s3
aws-cloudformation-security
aws-cloudformation-task-ecs-deploy-gh
aws-cloudformation-vpc
references
developer-kit-core
agents
commands
skills
developer-kit-devops
developer-kit-java
agents
commands
docs
skills
aws-lambda-java-integration
aws-rds-spring-boot-integration
aws-sdk-java-v2-bedrock
aws-sdk-java-v2-core
aws-sdk-java-v2-dynamodb
aws-sdk-java-v2-kms
aws-sdk-java-v2-lambda
aws-sdk-java-v2-messaging
aws-sdk-java-v2-rds
aws-sdk-java-v2-s3
aws-sdk-java-v2-secrets-manager
clean-architecture
graalvm-native-image
langchain4j-ai-services-patterns
references
langchain4j-mcp-server-patterns
references
langchain4j-rag-implementation-patterns
references
langchain4j-spring-boot-integration
langchain4j-testing-strategies
langchain4j-tool-function-calling-patterns
langchain4j-vector-stores-configuration
references
qdrant
references
spring-ai-mcp-server-patterns
spring-boot-actuator
spring-boot-cache
spring-boot-crud-patterns
spring-boot-dependency-injection
spring-boot-event-driven-patterns
spring-boot-openapi-documentation
spring-boot-project-creator
spring-boot-resilience4j
spring-boot-rest-api-standards
spring-boot-saga-pattern
spring-boot-security-jwt
assets
references
scripts
spring-boot-test-patterns
spring-data-jpa
references
spring-data-neo4j
references
unit-test-application-events
unit-test-bean-validation
unit-test-boundary-conditions
unit-test-caching
unit-test-config-properties
references
unit-test-controller-layer
unit-test-exception-handler
references
unit-test-json-serialization
unit-test-mapper-converter
references
unit-test-parameterized
unit-test-scheduled-async
references
unit-test-service-layer
references
unit-test-utility-methods
unit-test-wiremock-rest-api
references
developer-kit-php
developer-kit-project-management
developer-kit-python
developer-kit-specs
commands
docs
hooks
test-templates
tests
skills
developer-kit-tools
developer-kit-typescript
agents
docs
hooks
rules
skills
aws-cdk
aws-lambda-typescript-integration
better-auth
clean-architecture
drizzle-orm-patterns
dynamodb-toolbox-patterns
references
nestjs
nestjs-best-practices
nestjs-code-review
nestjs-drizzle-crud-generator
nextjs-app-router
nextjs-authentication
nextjs-code-review
nextjs-data-fetching
nextjs-deployment
nextjs-performance
nx-monorepo
react-code-review
react-patterns
shadcn-ui
tailwind-css-patterns
tailwind-design-system
references
turborepo-monorepo
typescript-docs
typescript-security-review
zod-validation-utilities
references
github-spec-kit