project-wide java dependency analysis and upgrade planning
Scans the entire Java project structure, parses build configuration (Maven/Gradle), and inventories all direct and transitive dependencies. Generates a customizable upgrade plan that identifies outdated libraries, framework versions, and Java language features, presenting recommendations in a VS Code UI panel that developers can review, edit, and approve before execution. Uses AST-level analysis to understand dependency usage patterns across the codebase.
Unique: Integrates GitHub Copilot's LLM reasoning with OpenRewrite's structural code analysis to generate context-aware upgrade plans that account for actual usage patterns in the codebase, not just version availability. Plans are editable within VS Code before execution, allowing developers to override AI recommendations.
vs alternatives: Differs from static dependency checkers (like Dependabot) by using LLM-driven reasoning to understand upgrade impact and generate customized plans, while remaining faster than manual code review by automating the analysis phase.
automated java code transformation with openrewrite
Executes code transformations against the Java project using OpenRewrite, an open-source framework that applies composable, recipe-based code modifications. Transformations are applied at the AST level, ensuring structural correctness (not regex-based). The extension runs transformations in a controlled manner, validates syntax, and automatically resolves build issues by re-running Maven/Gradle builds and fixing compilation errors.
Unique: Combines OpenRewrite's AST-based transformation engine with GitHub Copilot's LLM to automatically resolve build errors post-transformation. When compilation fails, the extension uses Copilot to suggest fixes rather than requiring manual debugging, creating a closed-loop automation pipeline.
vs alternatives: More reliable than IDE refactoring tools (like IntelliJ IDEA's built-in refactors) because OpenRewrite operates on a normalized AST representation, and more comprehensive than manual find-and-replace because it understands Java semantics and applies transformations consistently across the entire codebase.
post-upgrade cve scanning and automated remediation
After code transformation completes, scans all dependencies and transitive libraries for known Common Vulnerabilities and Exposures (CVEs) using a vulnerability database. Identifies vulnerable versions, cross-references with available patches, and uses GitHub Copilot's 'Agent Mode' to automatically apply fixes by updating dependency versions or applying security patches. Detects code inconsistencies introduced by upgrades and suggests corrections.
Unique: Integrates CVE scanning with LLM-driven automated remediation via Copilot Agent Mode, allowing the system to not only identify vulnerabilities but also apply fixes autonomously. Includes code inconsistency detection to catch side effects of upgrades, a feature absent from standalone CVE scanners.
vs alternatives: More proactive than Dependabot (which only alerts) because it automatically applies patches; more comprehensive than manual security audits because it scans transitive dependencies and applies fixes in seconds rather than hours.
ai-assisted unit test generation for upgraded code
Generates new unit test cases using GitHub Copilot to increase test coverage for code modified during the upgrade process. Analyzes which methods and classes were changed, understands their new signatures and behavior, and generates test cases that validate the upgraded code. Tests are generated separately from the upgrade process, allowing developers to review and integrate them independently. Uses LLM-based code understanding to infer test scenarios from method signatures and documentation.
Unique: Generates tests specifically for code changed during the upgrade process, using LLM understanding of API changes and method behavior. Tests are generated as separate artifacts, allowing developers to review and selectively integrate them rather than auto-applying them to the codebase.
vs alternatives: More targeted than generic test generation tools because it focuses on upgraded code; more intelligent than coverage-driven tools (like JaCoCo) because it understands method semantics and generates meaningful assertions, not just line-coverage-maximizing tests.
comprehensive upgrade summary and change tracking
Generates a detailed summary report after the upgrade process completes, documenting all file changes, updated dependencies with version deltas, test results, and remaining issues. Tracks commits and logs changes in a working branch, providing a complete audit trail. Summary includes metrics like number of files modified, dependencies upgraded, CVEs resolved, and test coverage delta. Enables developers to review the entire upgrade impact before merging to main branch.
Unique: Generates human-readable summaries using LLM-based natural language generation, not just structured data dumps. Integrates with Git to create an immutable audit trail in the working branch, enabling teams to review the entire upgrade history and rollback if needed.
vs alternatives: More comprehensive than Maven dependency reports because it includes code changes, test results, and security findings; more actionable than raw Git diffs because it synthesizes changes into a narrative summary with metrics and remaining issues highlighted.
interactive upgrade plan editing and customization
Presents the generated upgrade plan in a VS Code UI panel where developers can review, edit, and customize recommendations before execution. Allows selective enabling/disabling of specific upgrades, version pinning, and dependency exclusions. Changes to the plan are validated in real-time (e.g., checking for version conflicts) and reflected in the execution preview. Developers can add notes or justifications for customizations, which are preserved in the audit trail.
Unique: Provides interactive, in-editor customization of AI-generated plans rather than requiring developers to accept or reject the plan wholesale. Real-time validation ensures customizations don't introduce conflicts, and audit notes create accountability for deviations from recommendations.
vs alternatives: More flexible than fully automated tools (like Dependabot) because developers retain control; more efficient than manual planning because the LLM generates the baseline and developers only override exceptions.
java language feature modernization recommendations
Analyzes Java source code to identify opportunities for using newer language features (e.g., lambda expressions, records, sealed classes, pattern matching) available in the target Java version. Generates recommendations for code patterns that can be simplified or improved using modern syntax. Uses AST analysis to understand code structure and LLM reasoning to suggest idiomatic Java patterns. Recommendations are presented alongside upgrade plans and can be applied selectively.
Unique: Combines AST-level code analysis with LLM-driven pattern recognition to identify modernization opportunities that go beyond simple API migrations. Understands idiomatic Java patterns and suggests improvements that improve both readability and performance.
vs alternatives: More comprehensive than IDE inspections (like IntelliJ IDEA's built-in inspections) because it understands the full upgrade context and can suggest cross-cutting refactorings; more intelligent than regex-based tools because it understands Java semantics.
build system compatibility validation
Validates that upgraded dependencies are compatible with the project's build system (Maven or Gradle) and Java version. Checks for plugin version compatibility, enforces dependency constraint rules, and detects conflicts between transitive dependencies. Runs the build system to validate that the project compiles and tests pass after upgrades. Automatically suggests build configuration changes (e.g., updating plugin versions) if needed to resolve incompatibilities.
Unique: Integrates build system execution into the upgrade workflow, not just dependency analysis. Automatically suggests build configuration changes (e.g., plugin version updates) to resolve incompatibilities, creating a closed-loop validation pipeline.
vs alternatives: More thorough than dependency checkers (like Maven Dependency Plugin) because it actually runs the build and tests; more automated than manual validation because it suggests fixes rather than just reporting errors.
+2 more capabilities