CtrlK
BlogDocsLog inGet started
Tessl Logo

giuseppe-trisciuoglio/developer-kit

Comprehensive developer toolkit providing reusable skills for Java/Spring Boot, TypeScript/NestJS/React/Next.js, Python, PHP, AWS CloudFormation, AI/RAG, DevOps, and more.

90

Quality

90%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Risky

Do not use without reviewing

This version of the tile failed moderation
Moderation pipeline encountered an internal error
Overview
Quality
Evals
Security
Files

severity-levels.mdplugins/developer-kit-tools/skills/sonarqube-mcp/references/

SonarQube Severity Levels Reference

Complete reference for Sonar severity levels, impact categories, and clean code attributes.

Legacy Severity Levels

The traditional SonarQube severity model used five levels:

SeverityPriorityAction Required
BLOCKERCritical — must fix immediatelyBlock merge/deployment; fix before any release
CRITICALHigh — fix in current sprintAddress before merging to main
MAJORMedium — schedule for near termFix in next sprint or iteration
MINORLow — fix when convenientAddress in routine maintenance
INFOInformationalReview and document if accepted

New Severity Model (SonarQube 10+)

Newer versions use a Clean Code taxonomy with impact (severity on quality) and likelihood dimensions.

Impact Categories

HIGH — Significant negative effect; must be addressed promptly MEDIUM — Moderate effect; should be scheduled for resolution LOW — Minor effect; can be deferred to routine maintenance

Quality Dimensions

DimensionDescriptionAffected By
SECURITYResistance to attack and data breachesVulnerabilities, hotspots
RELIABILITYCode runs as expected without failuresBugs, error handling
MAINTAINABILITYEase of change and understandingCode smells, complexity

Clean Code Attributes

Issues are also tagged with a clean code attribute explaining why the code is problematic:

AttributeMeaning
CONVENTIONALDoes not follow established conventions
FORMATTEDPoor formatting affecting readability
IDENTIFIABLEPoor naming or identification
CLEARLogic is hard to understand
LOGICALContains logical errors
COMPLETEMissing error handling or validation
EFFICIENTPerformance or resource inefficiency
FOCUSEDDoes more than it should
MODULARPoor separation of concerns
TESTEDLacks tests
LAWFULLicense or legal compliance issue
TRUSTWORTHYSecurity or trust concern

Filtering by Severity in MCP Tools

Use ONLY these values in the severities API parameter for search_sonar_issues_in_projects:

{
  "severities": ["BLOCKER", "HIGH", "MEDIUM", "LOW", "INFO"]
}

Important: The legacy labels CRITICAL, MAJOR, MINOR may appear in display text and older Sonar documentation, but they are not valid filter values for the severities API parameter. CRITICAL → use HIGH, MAJOR → use MEDIUM, MINOR → use LOW.

Triage Decision Matrix

Use this matrix to decide how to handle each issue:

SeverityAction
BLOCKERFix immediately — do not merge until resolved
CRITICAL / HIGHFix before merging to main branch
MAJOR / MEDIUMAdd to backlog with defined deadline
MINOR / LOWFix in routine cleanup or document as accepted debt
INFOReview and close if informational only

Issue Statuses for change_sonar_issue_status

The key parameter is the issue's key field from search_sonar_issues_in_projects.

Status ValueWhen to Use
falsepositiveIssue flagged by Sonar is not actually a problem in this context
acceptIssue acknowledged but accepted as technical debt (replaces legacy WONT-FIX)
reopenReset issue to open state

Always require explicit user confirmation before changing issue status. Document the reason in the comment field.

Security Rule Tags

Security-related rules are tagged with industry standard references:

TagStandard
owasp-a1 through owasp-a10OWASP Top 10
cweCommon Weakness Enumeration
sans-top25SANS Top 25 Most Dangerous Software Errors
certCERT Secure Coding Standards
pci-dssPayment Card Industry Data Security Standard

Use show_rule with the rule key to see all tags and their implications.

Example Issue Response

{
  "key": "AY1234",
  "rule": "java:S2068",
  "project": "payment-service",
  "component": "src/main/java/PaymentService.java",
  "severity": "BLOCKER",
  "status": "OPEN",
  "message": "Remove this hard-coded password",
  "attribute": "TRUSTWORTHY",
  "category": "SECURITY",
  "startLine": 45,
  "endLine": 45,
  "created": "2025-01-15T10:30:00Z"
}

Reading this response:

  • severity: BLOCKER + category: SECURITY → must fix before any release
  • rule: java:S2068 → use show_rule with key java:S2068 to get remediation guidance
  • attribute: TRUSTWORTHY → clean code violation related to security trustworthiness

plugins

CHANGELOG.md

context7.json

CONTRIBUTING.md

README_CN.md

README_ES.md

README_IT.md

README.md

tessl.json

tile.json