Getting Started¶
Welcome to SuperQode (TUI) and SuperQE (CLI)! This guide will help you get up and running with agentic quality engineering. Learn how to set up your project, choose your workflow, and start improving code quality with AI-powered testing.
Quick Navigation¶
-
Installation
Install SuperQode via pip or from source (includes SuperQE). Set up your environment and verify installation.
-
Project Setup
Initialize your project, configure your preferred model, and choose your connection mode.
-
TUI Workflow
Interactive Terminal UI for exploratory testing and real-time quality engineering.
-
CLI Workflow
SuperQE command-line interface for automation, CI/CD integration, and batch processing.
-
Configuration
Configure providers, roles, and settings. Customize SuperQode for your workflow.
-
Troubleshooting
Common issues and solutions. Get help when things go wrong.
Prerequisites¶
Before installing SuperQode, ensure you have:
| Requirement | Version | Notes |
|---|---|---|
| Python | 3.12+ | Python 3.12 recommended |
| pip | Latest | Or uv for isolated installation |
| Git | 2.25+ | For workspace isolation features |
Optional Dependencies¶
| Tool | Purpose |
|---|---|
| Node.js | JavaScript/TypeScript linting |
| Go | Go project analysis |
| Rust | Rust project analysis |
Installation¶
Verify Installation¶
Project Setup¶
Step 1: Initialize Your Project¶
Navigate to your project directory and initialize SuperQode:
This command will:
- Create
superqode.yamlusing the comprehensive role catalog - Enable core, implemented roles and leave the rest disabled
- Let you edit or delete roles you donβt need
If you want the interactive wizard, use superqe init --guided.
Step 2: Choose Your Connection Mode¶
SuperQode supports three connection modes. Choose based on your needs:
ACP (Agent Client Protocol) - Recommended β¶
Best for: Teams wanting full coding agent capabilities (file editing, shell, MCP tools)
Why ACP? - Full coding agent features (edit files, run shell, use MCP tools) - Pre-configured agents (Enterprise adds optimized prompt packs) - No API key management (agents handle it) - Most powerful for exploratory testing
Setup:
# 1. Install an ACP agent (e.g., OpenCode)
npm i -g opencode-ai
# 2. Edit superqode.yaml to configure
In TUI: - Type :connect (or :c for short) for an interactive picker - Or directly: :connect acp opencode
In CLI: superqode connect acp opencode
BYOK (Bring Your Own Key)¶
Best for: Teams using cloud providers with their own API keys
Why BYOK? - Use your existing API keys (OpenAI, Anthropic, Google, etc.) - Direct provider integration - Cost control with your accounts - Good for automation and CI/CD
Setup:
# 1. Set your API key
export GOOGLE_API_KEY=your-api-key-here
# or
export OPENAI_API_KEY=your-api-key-here
# or
export ANTHROPIC_API_KEY=your-api-key-here
# 2. Edit superqode.yaml to set default provider
In TUI: - Type :connect (or :c for short) for an interactive picker - Or directly: :connect byok google gemini-3-pro
In CLI: superqode connect byok google gemini-3-pro
Local Models¶
Best for: Privacy-first teams or offline development
Why Local? - Complete privacy (no data leaves your machine) - No API costs - Works offline - Self-hosted infrastructure
Setup:
# 1. Start a local model server (e.g., Ollama)
ollama serve
# 2. Pull a model
ollama pull qwen3:8b
# 3. Edit superqode.yaml to configure
In TUI: - Type :connect (or :c for short) for an interactive picker - Or directly: :connect local ollama qwen3:8b
In CLI: superqode connect local ollama qwen3:8b
Step 3: Configure Your Model Choice¶
Edit superqode.yaml to set your preferred connection:
superqode:
version: "2.0"
team_name: "My QE Team"
# Choose your default mode
default:
mode: acp # or "byok" or "local"
coding_agent: opencode # for ACP
# provider: google # for BYOK
# model: gemini-3-pro # for BYOK
# provider: ollama # for Local
# model: qwen3:8b # for Local
providers:
google:
api_key_env: GOOGLE_API_KEY
default_model: qwen3:8b
base_url: http://localhost:11434
Understanding the Architecture¶
Role-Based Multi-Agent System¶
SuperQode uses a role-based multi-agent architecture where different AI agents specialize in different quality engineering tasks:
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β SuperQode Architecture β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β β
β ββββββββββββββββ ββββββββββββββββ ββββββββββββββββ β
β β Security β β API β β Performance β β
β β Tester β β Tester β β Tester β β
β ββββββββββββββββ ββββββββββββββββ ββββββββββββββββ β
β β
β ββββββββββββββββ ββββββββββββββββ ββββββββββββββββ β
β β Unit β β E2E β β Fullstack β β
β β Tester β β Tester β β Reviewer β β
β ββββββββββββββββ ββββββββββββββββ ββββββββββββββββ β
β β
β β Ephemeral Workspace β β
β β
β Original Code β Sandbox β Revert β
β β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
Key Concepts:
- Ephemeral Workspace: Agents work in isolated worktrees or snapshots. All changes are reverted after the session.
- Role Specialization: Each role focuses on specific quality aspects (security, API, performance, etc.)
- Parallel Execution: Multiple roles can run simultaneously for comprehensive analysis
- Artifact Preservation: Findings, patches, and reports are saved even though code changes are reverted
QE Roles Explained¶
| Role | Purpose | Best For |
|---|---|---|
security_tester | Find vulnerabilities (OWASP Top 10, injection, auth) | Pre-deployment security audits |
api_tester | Validate API contracts and endpoints | API-first projects |
unit_tester | Find coverage gaps and edge cases | Code coverage improvement |
performance_tester | Detect bottlenecks (N+1 queries, memory leaks) | Performance-critical apps |
e2e_tester | Test complete user workflows | Frontend/Fullstack apps |
fullstack | Senior QE comprehensive review | Overall quality assessment |
Two Workflows: Choose Your Path¶
SuperQode offers two distinct workflows designed for different use cases:
TUI Workflow (Recommended for Exploratory Testing)¶
Best for: Interactive exploration, ad-hoc testing, learning, and real-time feedback
Characteristics¶
- β Interactive Terminal UI - Rich, visual interface
- β Real-time feedback - See results as they happen
- β Exploratory testing - Chat with agents, ask questions
- β Visual navigation - Browse files, view diffs, explore findings
- β Session management - Save and resume sessions
- β Multi-agent handoff - Switch between roles interactively
Quick Start¶
# 1. Launch TUI
superqode
# 2. Connect to your agent (in TUI)
# Option A: Use interactive picker (recommended for first-time users)
:connect
# or type :c for short
# The TUI will guide you through selecting ACP, BYOK, or Local, then show available options
# Option B: Direct connection (if you know exactly what you want)
:connect acp opencode
# or
:connect byok google gemini-3-pro
# or
:connect local ollama qwen3:8b
# 3. Switch to a QE role (in TUI)
:qe security_tester
# 4. Start exploring! Type natural language requests:
# "Check for SQL injection vulnerabilities in the API"
# "Test the authentication flow"
# "Find performance bottlenecks in the database queries"
# Note: To run automated QE sessions, use CLI commands:
# superqe run . --mode quick # Quick 60-second scan
# superqe run . --mode deep # Comprehensive 30-minute analysis
# 5. View findings interactively
:view <file> # View file content
:diff # See suggested changes
:plan # View agent's plan
TUI Commands Reference¶
| Command | Description |
|---|---|
:connect or :c | Interactive connection picker (recommended) |
:connect acp <agent> | Connect directly to ACP agent |
:connect byok <provider> <model> | Connect directly to BYOK provider |
:connect local <provider> <model> | Connect directly to local model |
:qe <role> | Switch to QE role mode (e.g., :qe security_tester) |
:view <file> | View file content |
:diff | View suggested changes |
:plan | View agent's plan |
:help | Show all commands |
:quit | Exit TUI |
CLI Workflow (Recommended for Automation)¶
Best for: CI/CD integration, automated testing, batch processing, and scripting
Characteristics¶
- β Command-line interface - Easy to script and automate
- β CI/CD friendly - JSONL and JUnit XML output
- β Batch processing - Run on multiple projects
- β Non-interactive - Perfect for scheduled jobs
- β Configurable - Everything via config file or flags
Quick Start¶
# 1. Initialize project (first time)
superqe init
# 2. Edit superqode.yaml with your model choice
# 3. Run QE session
superqe run . --mode quick
# 4. Run with specific roles
superqe run . --mode deep -r security_tester -r api_tester
# 5. CI/CD output
superqe run . --mode quick --jsonl > results.jsonl
superqe run . --mode quick --junit results.xml
# 6. View artifacts
superqe artifacts .
superqe dashboard
Common CLI Commands¶
# Quick scan
superqe run . --mode quick
# Deep analysis
superqe run . --mode deep
# Specific roles
superqe run . -r security_tester -r api_tester
# With test generation (Enterprise)
superqe run . --mode deep --generate
# With fix suggestions (Enterprise)
superqe run . --mode deep --allow-suggestions
# CI-friendly output (Enterprise)
superqe run . --mode quick --jsonl
superqe run . --mode quick --junit results.xml
# View results (Enterprise)
superqe artifacts .
superqe dashboard
superqe status
When to Use Which Workflow?¶
Use TUI When:¶
- π― Exploring a codebase for the first time
- π― Ad-hoc testing and investigation
- π― Learning how SuperQode works
- π― Need interactive feedback and real-time results
- π― Want to chat with agents and ask questions
- π― Debugging specific issues interactively
Use CLI When:¶
- π€ Running in CI/CD pipelines
- π€ Scheduled quality checks (nightly, weekly)
- π€ Batch processing multiple projects
- π€ Automated testing workflows
- π€ Need structured output (JSONL, JUnit XML)
- π€ Scripted or non-interactive environments
Complete Setup Example¶
Here's a complete example from scratch:
# 1. Install SuperQode
pip install superqode
# 2. Navigate to your project
cd ~/projects/my-api
# 3. Initialize configuration
superqe init
# This will:
# - Detect framework (e.g., FastAPI)
# - Create superqode.yaml
# - Suggest recommended roles
# 4. Edit superqode.yaml
nano superqode.yaml
# Set your preferred connection mode and model
# 5. Choose your workflow:
# Option A: TUI (exploratory)
superqode
# Then: :connect acp opencode
# Then: :qe security_tester
# Then: Start asking questions!
# Option B: CLI (automation)
superqe run . --mode quick -r security_tester
Next Steps¶
- Project Setup Guide - Detailed step-by-step setup
- Your First QE Session - Complete walkthrough
- Configuration Reference - Customize SuperQode
- Understanding Modes - Deep dive into ACP, BYOK, Local
- QE Roles - Learn about each role
- CI/CD Integration - Add to your pipeline
Getting Help¶
- Run
superqode --helpfor command help - Use
:helpin the TUI for interactive help - Check the CLI Reference for detailed command documentation