Open Source Linux Source Code Analysis Tools

Browse free open source Source Code Analysis tools and projects for Linux below. Use the toggles on the left to filter open source Source Code Analysis tools by OS, license, language, programming language, and project status.

  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    Bluprint
    Bluprint is an Agile-MDA code generator. It is a fuss-free tool supporting code generation from UML modelling tools. It supports model/code merging so engineers can easily extend and maintain generated code. Bluprint has been developed using itself.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    .Net Checker checks all code dependencies in .Net projects to ensure a stable architecture - up to multi-million LOC source trees. Moreover, it can produce flexible DOT-based dependency graphs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Eclipse Plug-In that determines the Minimal Access Modifier of Java types and methods project and computes the software metrics Inappropriate Generosity with Accessibility of Types (IGAT) and Inappropriate Generosity with Accessibility of Methods (IGAM). The Minimal Access Modifier of a Java type or type member is the most restrictive access modifier that is able to allow all actual usages of the particular type or member from inside a given code base (normally the entire source code of the respective Java project). The metric Inappropriate Generosity with Accessibility of Types (IGAT) indicates the proportion of those types which actual access modifier is more generous than the minimal one relative to the total number of types in a given source code subset. Analog the metric Inappropriate Generosity with Accessibility of Method (IGAM) indicates the proportion of those methods which actual access modifier is more generous than the minimal one relative to the total number of me
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Java Call Trace to UML Sequence Diagram
    This tool helps you to reverse engineer UML Sequence Diagram for your java program at runtime. It works well with both complex java programs (that have multiple threads) and J2EE applications deployed on Application Servers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 5
    Metrix++

    Metrix++

    Management of source code quality is possible.

    The project has been moved to https://github.com/metrixplusplus/metrixplusplus ______________________ Metrix++ is an extendable tool to collect and analyse code metrics. - Multiple languages supported - Multiple metrics available - Configurable. Every metric has got 'turn-on' and other configuration options. There are no predefined thresholds for metrics or rules. You can choose and configure any limit you want. - High-performance. Processes thousands of files per minutes. - Seamless application to legacy code due to embedded capability to differentiate new code, modified and legacy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    PhpDependencyAnalysis

    PhpDependencyAnalysis

    Static code analysis to find violations in a dependency graph

    PhpDependencyAnalysis is an extendable static code analysis for object-oriented PHP-Projects to generate dependency graphs from abstract datatypes (Classes, Interfaces and Traits) based on namespaces. Dependencies can be aggregated to build graphs for several levels, like Package-Level or Layer-Level. Each dependency can be verified to a defined architecture.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    TODOs

    TODOs

    Search TODO, FIXME and similar comments in project files.

    TODOs is a small command-line utility to search TODO, FIXME and similar comments in project files. It is written in Python 3 and licensed under the terms of GNU GPL 3 license. Supported output formats are TXT, HTML and XML.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    funcfinder

    function finder

    ff util is created for searching some text (functions, variables, definitions) in some source tree in all files (and just for fun), a program for programmers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    svncr, abbreviated "subversion code review tool" uses svn to give you a blame, log and diff all in one report. It is a diff format report that can get split out by filter that matches to log messages and code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • Previous
  • You're on page 1
  • Next