CodeFlow: Visualize Any GitHub Repo's Architecture in Seconds

By Prahlad Menon 3 min read

Every developer knows the feeling: you open an unfamiliar codebase and spend the first hour just trying to understand how the pieces fit together. Which files depend on which? If I change this module, what breaks?

CodeFlow solves exactly that β€” paste any GitHub URL and get an interactive architecture map in seconds. No installation. No account. No data leaves your browser.

What It Does

CodeFlow fetches your repo directly from GitHub’s API and builds a dependency graph entirely in-browser:

  • Architecture map β€” see how files connect, click any node to highlight its dependency tree
  • Blast radius β€” select a file and instantly see how many others would be affected by changes
  • Security scan β€” flags hardcoded secrets, SQL injection patterns, dangerous eval() usage, and debug statements in production code
  • Pattern detection β€” identifies Singletons, Factories, Observer patterns, React hooks, and anti-patterns like God Objects
  • Health score β€” A-F grade based on dead code, circular dependencies, coupling metrics, and security issues
  • Churn view β€” color files by commit frequency to see what’s actively evolving
  • PR blast radius β€” paste a PR URL to see exactly which files it touches
  • Local file support β€” drag and drop folders to analyze private code without uploading anything

It also works on Obsidian vaults β€” paste a markdown directory and it renders your notes as a connected graph with [[wiki-links]] as edges.

We Ran It on soul.py

soul.py is our open-source persistent memory layer for AI agents. Here’s what CodeFlow found:

Repo stats:

  • 27 files Β· 139 functions Β· 44 dependency links
  • 3,722 lines of code (80% Python, 17% Markdown)
  • Health Score: 76/100

Architecture issues flagged:

  • 1 unused function β€” a dead code candidate worth cleaning up
  • 1 large file with 15+ functions β€” rag_memory.py is doing a lot of heavy lifting
  • 2 duplicate function names across files β€” easy source of confusion
  • 8 high-complexity files with scores >30

Patterns detected (5): Dataclasses, Class Modules, Context Provider patterns, and more β€” consistent with a well-structured Python library.

Security findings (4 High): CodeFlow flagged hardcoded api_key= values β€” these are placeholder defaults in the examples folder ("sm_live_...", "ollama"), not real secrets. But it’s a good reminder that even demo keys in example files will get flagged. If you’re shipping a library, consider api_key="YOUR_KEY_HERE" conventions to make the intent unambiguous.

The architecture graph itself was the most revealing part β€” you could immediately see rag_memory as the dominant node, the clean separation between soulmate/ and modulizer/ folders, and how tests/ connects back to core modules.

Why This Matters

Most code analysis tools require you to install something, create an account, or push your code to a third-party server. CodeFlow does none of that. It’s a single HTML file that runs entirely in your browser β€” open-source, zero dependencies, no build step required.

git clone https://github.com/braedonsaunders/codeflow.git
open index.html  # that's it

For teams doing code reviews, onboarding new engineers, or auditing legacy codebases β€” this is the kind of tool that should be in your standard workflow.

Try It

β†’ codeflow-five.vercel.app β€” just paste menonpg/soul.py (or any repo) and hit Analyze

β†’ GitHub β€” star it, it deserves the attention

The soul.py analysis link is shareable too β€” anyone can re-run the same analysis from the URL.