Skip to content

Getting Started

Welcome to SuperQode (TUI) and SuperQE (CLI)! This guide will help you get up and running with agentic quality engineering. Learn how to set up your project, choose your workflow, and start improving code quality with AI-powered testing.


Quick Navigation

  • Installation


    Install SuperQode via pip or from source (includes SuperQE). Set up your environment and verify installation.

    Install now

  • Project Setup


    Initialize your project, configure your preferred model, and choose your connection mode.

    Setup guide

  • TUI Workflow


    Interactive Terminal UI for exploratory testing and real-time quality engineering.

    TUI guide

  • CLI Workflow


    SuperQE command-line interface for automation, CI/CD integration, and batch processing.

    CLI guide

  • Configuration


    Configure providers, roles, and settings. Customize SuperQode for your workflow.

    Configure

  • Troubleshooting


    Common issues and solutions. Get help when things go wrong.

    Troubleshooting


Prerequisites

Before installing SuperQode, ensure you have:

Requirement Version Notes
Python 3.12+ Python 3.12 recommended
pip Latest Or uv for isolated installation
Git 2.25+ For workspace isolation features

Optional Dependencies

Tool Purpose
Node.js JavaScript/TypeScript linting
Go Go project analysis
Rust Rust project analysis

Installation

# Install uv if needed
curl -LsSf https://astral.sh/uv/install.sh | sh

# Install SuperQode
uv tool install superqode
pip install superqode
git clone https://github.com/SuperagenticAI/superqode.git
cd superqode
pip install -e .

Verify Installation

# Check version
superqode --version

# View help
superqode --help

Project Setup

Step 1: Initialize Your Project

Navigate to your project directory and initialize SuperQode:

cd /path/to/your/project
superqe init

This command will:

  1. Create superqode.yaml using the comprehensive role catalog
  2. Enable core, implemented roles and leave the rest disabled
  3. Let you edit or delete roles you don’t need

If you want the interactive wizard, use superqe init --guided.

Step 2: Choose Your Connection Mode

SuperQode supports three connection modes. Choose based on your needs:

Best for: Teams wanting full coding agent capabilities (file editing, shell, MCP tools)

Why ACP? - Full coding agent features (edit files, run shell, use MCP tools) - Pre-configured agents (Enterprise adds optimized prompt packs) - No API key management (agents handle it) - Most powerful for exploratory testing

Setup:

# 1. Install an ACP agent (e.g., OpenCode)
npm i -g opencode-ai

# 2. Edit superqode.yaml to configure

In TUI: - Type :connect (or :c for short) for an interactive picker - Or directly: :connect acp opencode

In CLI: superqode connect acp opencode

BYOK (Bring Your Own Key)

Best for: Teams using cloud providers with their own API keys

Why BYOK? - Use your existing API keys (OpenAI, Anthropic, Google, etc.) - Direct provider integration - Cost control with your accounts - Good for automation and CI/CD

Setup:

# 1. Set your API key
export GOOGLE_API_KEY=your-api-key-here
# or
export OPENAI_API_KEY=your-api-key-here
# or
export ANTHROPIC_API_KEY=your-api-key-here

# 2. Edit superqode.yaml to set default provider

In TUI: - Type :connect (or :c for short) for an interactive picker - Or directly: :connect byok google gemini-3-pro

In CLI: superqode connect byok google gemini-3-pro

Local Models

Best for: Privacy-first teams or offline development

Why Local? - Complete privacy (no data leaves your machine) - No API costs - Works offline - Self-hosted infrastructure

Setup:

# 1. Start a local model server (e.g., Ollama)
ollama serve

# 2. Pull a model
ollama pull qwen3:8b

# 3. Edit superqode.yaml to configure

In TUI: - Type :connect (or :c for short) for an interactive picker - Or directly: :connect local ollama qwen3:8b

In CLI: superqode connect local ollama qwen3:8b

Step 3: Configure Your Model Choice

Edit superqode.yaml to set your preferred connection:

superqode:
  version: "2.0"
  team_name: "My QE Team"

# Choose your default mode
default:
  mode: acp  # or "byok" or "local"
  coding_agent: opencode  # for ACP
  # provider: google        # for BYOK
  # model: gemini-3-pro      # for BYOK
  # provider: ollama         # for Local
  # model: qwen3:8b          # for Local

providers:
  google:
    api_key_env: GOOGLE_API_KEY
  default_model: qwen3:8b
  base_url: http://localhost:11434

Understanding the Architecture

Role-Based Multi-Agent System

SuperQode uses a role-based multi-agent architecture where different AI agents specialize in different quality engineering tasks:

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚              SuperQode Architecture                      β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚                                                          β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚
β”‚  β”‚   Security   β”‚  β”‚     API      β”‚  β”‚  Performance β”‚ β”‚
β”‚  β”‚   Tester     β”‚  β”‚   Tester     β”‚  β”‚   Tester     β”‚ β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚
β”‚                                                          β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚
β”‚  β”‚     Unit     β”‚  β”‚      E2E     β”‚  β”‚  Fullstack   β”‚ β”‚
β”‚  β”‚   Tester     β”‚  β”‚   Tester     β”‚  β”‚  Reviewer    β”‚ β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚
β”‚                                                          β”‚
β”‚              ↓ Ephemeral Workspace ↓                     β”‚
β”‚                                                          β”‚
β”‚        Original Code β†’ Sandbox β†’ Revert                 β”‚
β”‚                                                          β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Key Concepts:

  • Ephemeral Workspace: Agents work in isolated worktrees or snapshots. All changes are reverted after the session.
  • Role Specialization: Each role focuses on specific quality aspects (security, API, performance, etc.)
  • Parallel Execution: Multiple roles can run simultaneously for comprehensive analysis
  • Artifact Preservation: Findings, patches, and reports are saved even though code changes are reverted

QE Roles Explained

Role Purpose Best For
security_tester Find vulnerabilities (OWASP Top 10, injection, auth) Pre-deployment security audits
api_tester Validate API contracts and endpoints API-first projects
unit_tester Find coverage gaps and edge cases Code coverage improvement
performance_tester Detect bottlenecks (N+1 queries, memory leaks) Performance-critical apps
e2e_tester Test complete user workflows Frontend/Fullstack apps
fullstack Senior QE comprehensive review Overall quality assessment

Learn more about roles β†’


Two Workflows: Choose Your Path

SuperQode offers two distinct workflows designed for different use cases:


Best for: Interactive exploration, ad-hoc testing, learning, and real-time feedback

Characteristics

  • βœ… Interactive Terminal UI - Rich, visual interface
  • βœ… Real-time feedback - See results as they happen
  • βœ… Exploratory testing - Chat with agents, ask questions
  • βœ… Visual navigation - Browse files, view diffs, explore findings
  • βœ… Session management - Save and resume sessions
  • βœ… Multi-agent handoff - Switch between roles interactively

Quick Start

# 1. Launch TUI
superqode

# 2. Connect to your agent (in TUI)
# Option A: Use interactive picker (recommended for first-time users)
:connect
# or type :c for short
# The TUI will guide you through selecting ACP, BYOK, or Local, then show available options

# Option B: Direct connection (if you know exactly what you want)
:connect acp opencode
# or
:connect byok google gemini-3-pro
# or
:connect local ollama qwen3:8b

# 3. Switch to a QE role (in TUI)
:qe security_tester

# 4. Start exploring! Type natural language requests:
# "Check for SQL injection vulnerabilities in the API"
# "Test the authentication flow"
# "Find performance bottlenecks in the database queries"

# Note: To run automated QE sessions, use CLI commands:
# superqe run . --mode quick   # Quick 60-second scan
# superqe run . --mode deep    # Comprehensive 30-minute analysis

# 5. View findings interactively
:view <file>    # View file content
:diff           # See suggested changes
:plan           # View agent's plan

TUI Commands Reference

Command Description
:connect or :c Interactive connection picker (recommended)
:connect acp <agent> Connect directly to ACP agent
:connect byok <provider> <model> Connect directly to BYOK provider
:connect local <provider> <model> Connect directly to local model
:qe <role> Switch to QE role mode (e.g., :qe security_tester)
:view <file> View file content
:diff View suggested changes
:plan View agent's plan
:help Show all commands
:quit Exit TUI

Full TUI documentation β†’


Best for: CI/CD integration, automated testing, batch processing, and scripting

Characteristics

  • βœ… Command-line interface - Easy to script and automate
  • βœ… CI/CD friendly - JSONL and JUnit XML output
  • βœ… Batch processing - Run on multiple projects
  • βœ… Non-interactive - Perfect for scheduled jobs
  • βœ… Configurable - Everything via config file or flags

Quick Start

# 1. Initialize project (first time)
superqe init

# 2. Edit superqode.yaml with your model choice

# 3. Run QE session
superqe run . --mode quick

# 4. Run with specific roles
superqe run . --mode deep -r security_tester -r api_tester

# 5. CI/CD output
superqe run . --mode quick --jsonl > results.jsonl
superqe run . --mode quick --junit results.xml

# 6. View artifacts
superqe artifacts .
superqe dashboard

Common CLI Commands

# Quick scan
superqe run . --mode quick

# Deep analysis
superqe run . --mode deep

# Specific roles
superqe run . -r security_tester -r api_tester

# With test generation (Enterprise)
superqe run . --mode deep --generate

# With fix suggestions (Enterprise)
superqe run . --mode deep --allow-suggestions

# CI-friendly output (Enterprise)
superqe run . --mode quick --jsonl
superqe run . --mode quick --junit results.xml

# View results (Enterprise)
superqe artifacts .
superqe dashboard
superqe status

Full CLI reference β†’


When to Use Which Workflow?

Use TUI When:

  • 🎯 Exploring a codebase for the first time
  • 🎯 Ad-hoc testing and investigation
  • 🎯 Learning how SuperQode works
  • 🎯 Need interactive feedback and real-time results
  • 🎯 Want to chat with agents and ask questions
  • 🎯 Debugging specific issues interactively

Use CLI When:

  • πŸ€– Running in CI/CD pipelines
  • πŸ€– Scheduled quality checks (nightly, weekly)
  • πŸ€– Batch processing multiple projects
  • πŸ€– Automated testing workflows
  • πŸ€– Need structured output (JSONL, JUnit XML)
  • πŸ€– Scripted or non-interactive environments

Complete Setup Example

Here's a complete example from scratch:

# 1. Install SuperQode
pip install superqode

# 2. Navigate to your project
cd ~/projects/my-api

# 3. Initialize configuration
superqe init
# This will:
# - Detect framework (e.g., FastAPI)
# - Create superqode.yaml
# - Suggest recommended roles

# 4. Edit superqode.yaml
nano superqode.yaml
# Set your preferred connection mode and model

# 5. Choose your workflow:

# Option A: TUI (exploratory)
superqode
# Then: :connect acp opencode
# Then: :qe security_tester
# Then: Start asking questions!

# Option B: CLI (automation)
superqe run . --mode quick -r security_tester

Next Steps

  1. Project Setup Guide - Detailed step-by-step setup
  2. Your First QE Session - Complete walkthrough
  3. Configuration Reference - Customize SuperQode
  4. Understanding Modes - Deep dive into ACP, BYOK, Local
  5. QE Roles - Learn about each role
  6. CI/CD Integration - Add to your pipeline

Getting Help

  • Run superqode --help for command help
  • Use :help in the TUI for interactive help
  • Check the CLI Reference for detailed command documentation