šŸ”
Free

Code Review Assistant

Get thorough code reviews with security analysis, performance suggestions, and best practice recommendations. Supports all major programming languages.

0 conversations 0 messages by Promptha

"Hello! I'm your Code Review Assistant. Paste your code and I'll analyze it for bugs, security issues, performance problems, and best practices. What would you like me to review?"

Use Cases

šŸ”

Pull Request Reviews

Get detailed code reviews with suggestions for improvements, bug detection, and best practices.

šŸ”’

Security Analysis

Identify potential security vulnerabilities, injection risks, and authentication issues.

⚔

Performance Optimization

Find performance bottlenecks, memory leaks, and optimization opportunities.

šŸ“

Code Standards

Ensure code follows best practices, naming conventions, and team style guides.

See It In Action

Live DemoInteractive
See how Code Review Assistant works
1 / 2
U
Your Prompt
Review this authentication code for security issues:
```javascript
app.post("/login", (req, res) => {
const { username, password } = req.body;
const query = `SELECT * FROM users WHERE username = '${username}' AND password = '${password}'`;
db.query(query, (err, results) => {
if (results.length > 0) {
res.json({ token: jwt.sign({ user: username }, "secret123") });
}
});
});
```
$focus:security
$focus:security
Code Review Assistant Response

🚨 Critical Security Issues Found

1. SQL Injection (CRITICAL)

// VULNERABLE

const query = `SELECT * FROM users WHERE username = '${username}'...`

// FIXED - Use parameterized queries

const query = 'SELECT * FROM users WHERE username = ? AND password = ?';

db.query(query, [username, hashedPassword], ...)

2. Plain Text Passwords (CRITICAL)

Passwords should never be stored or compared in plain text.

// Use bcrypt for password hashing

const isValid = await bcrypt.compare(password, user.hashedPassword);

3. Hardcoded JWT Secret (HIGH)

// Move to environment variable

jwt.sign({ user: username }, process.env.JWT_SECRET)

4. Missing Input Validation (MEDIUM)

Add validation for username/password format and length.

5. No Rate Limiting (MEDIUM)

Add rate limiting to prevent brute force attacks.

Generated Outputs
Issues Found
• SQL Injection (CRITICAL) • Plain Text Passwords (CRITICAL) • Hardcoded JWT Secret (HIGH) • Missing Input Validation (MEDIUM) • No Rate Limiting (MEDIUM)
Examples:
DSL Syntax Guide
/command= actions
@kb:name= knowledge
$param= settings

Key Features

Security scanning Performance analysis Best practice checks Automated suggestions

How To Use

1.
Paste your code - Share the code snippet or file you want reviewed
2.
Set focus area - Use $focus:security, $focus:performance, or $focus:readability
3.
Specify language - Add $lang:typescript for language-specific feedback
4.
Request fixes - Ask for corrected code along with explanations

Who Is This For?

Software developers, tech leads, engineering teams, open-source maintainers, and anyone who wants to improve code quality before merging.

Start chatting with Code Review Assistant

Start your conversation for free

Chat Now

Try Asking

"Review this Python function for security issues"

"Analyze my React component for performance"

"Check this API endpoint for vulnerabilities"

"Suggest improvements for my database query"

Created By

Related Tutorials & Guides

Ready to chat with Code Review Assistant?

Join thousands of users having conversations with AI on Promptha.