8 specialized analyzers for code review, vulnerability scanning, architecture drift detection, and release readiness — directly in your CI/CD pipeline.
Evaluates correctness, performance, SOLID principles, DRY violations, error handling, naming, and anti-patterns — with line-level suggestions and a 1–10 quality score.
code-reviewDetects OWASP Top 10, hardcoded secrets, SQL/command injection, unsafe deserialization, and SSRF — with CWE ID mapping and specific remediation steps per finding.
vulnerabilityDetects layer violations, circular deps, coupling drift, and API boundary erosion across hexagonal, layered, CQRS, event-driven, and microservice patterns.
architecture-driftFinds untested code paths, missing unit/integration/contract tests, race conditions, and boundary gaps — suggests concrete test cases with pseudo-code.
test-gapsFlags GPL/license conflicts, unmaintained packages, unpinned versions, and transitive depth risk — scored 1–10 with supply-chain risk ranking.
dependency-riskScores commit hygiene and Conventional Commits compliance, detects breaking changes, generates changelog entries, and recommends patch/minor/major semver bumps.
commit-intelAnalyzes your Jenkinsfile directly — finds parallelization wins, missing caches, secret handling issues, failure resilience gaps, and estimates the % build-time reduction achievable.
pipeline-advisorSynthesizes all analyzers with weighted scoring (security 3×, architecture 2×) into a final verdict — SHIP IT, CAUTION, HOLD, or BLOCK — plus a technical debt estimate in hours.
release-readiness| Capability | ForgeAI | Typical AI plugins |
|---|---|---|
| Architecture drift detection | ✓ Pattern-aware | ✕ Code-level only |
| Composite release scoring | ✓ Weighted (security 3×, arch 2×) | ✕ Single-dimension |
| Pipeline self-optimization | ✓ Analyzes Jenkinsfile itself | ✕ Not available |
| Air-gapped local LLM | ✓ Ollama, LM Studio, vLLM | ✕ Cloud-only |
| Multi-provider support | ✓ OpenAI + Claude + Ollama + Groq | ✕ Single vendor lock-in |
| Quality gate verdicts | ✓ SHIP_IT / CAUTION / HOLD / BLOCK | ✕ Pass/fail only |
| Supply-chain risk analysis | ✓ License + maintenance + depth | ✕ CVE-only |
| Auto changelog + semver | ✓ From commit intelligence | ✕ Not available |
| Admin GUI with test button | ✓ Full Jenkins config UI | ✕ Config-as-code only |
def report = forgeAI( analyzers: [ 'code-review', 'vulnerability', 'architecture-drift', 'test-gaps', 'dependency-risk', 'release-readiness' ], sourceGlob: 'src/**/*.java', contextInfo: 'Spring Boot, hexagonal arch', failOnCritical: true, criticalThreshold: 4 ) echo "Score: ${report.compositeScore}/10" echo "Security: ${report['vulnerability-Score']}"
def sec = forgeAIScan( 'vulnerability', source: readFile('src/App.java'), context: 'Java 17 REST API, PII data' ) // returns: score, severity, summary, // findingsCount, criticalCount, highCount if (sec.criticalCount > 0) { error("${sec.criticalCount} critical vulns") } echo "Score: ${sec.score}/10 — ${sec.severity}"
Search for ForgeAI Pipeline Intelligence in Manage Jenkins → Plugins → Available, or download the .hpi from the plugin site.
plugins.jenkins.io/forgeai-pipeline-intelligence
Go to Manage Jenkins → System → ForgeAI. Pick your provider, enter your API key credential, and hit Test Connection.
OpenAI → gpt-4o
Claude → claude-opus-4-7
Ollama → codellama:13b
One step in your Jenkinsfile. Eight dimensions of intelligence. A report on every build.
forgeAI analyzers: ['code-review',
'vulnerability', 'architecture-drift']
Open source. MIT License. Free forever.