Run kluster.ai code reviews straight from your terminal. Install kluster-cli, authenticate with your API key, and review your first changes. No IDE or CI pipeline required.
kluster loginGet your API key at: https://platform.kluster.ai/cliEnter your API key: ************************************β Validating API key...β Successfully authenticatedTime to ship better code, try one of these: kluster review staged # Review staged changes kluster hooks install pre-push # Auto-review on git push/commit
kluster review stagedβ Reviewing code [ββββββββββββββββββββββββββββββββββββββββ] 100%β Reviewing code complete!Review: 507f1f77bcf86cd799439011Found 2 issue(s)#1 CRITICAL [P0] securitySQL injection vulnerability detected in user input handling. User-provideddata is concatenated directly into SQL query without sanitization.at src/db/queries.go:45-52More details The function buildQuery() takes user input from the request body and concatenates it directly into the SQL string.Fix Use parameterized queries: db.Query("SELECT * FROM users WHERE id = ?", userID)ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ#2 HIGH [P1] logicalPotential null pointer dereference. The variable 'config' may be nilwhen accessed on line 78.at cmd/server.go:78Fix Add a nil check before accessing config properties.
That's it. kluster.ai analyzes your code and flags issues with severity levels, explanations, and suggested fixes.
Want a deeper scan? Re-run the same command with --mode deep.