Conversation
Signed-off-by: Neha Gupta <gneha21[at]yahoo>
FAQSchema.jsx was never imported anywhere — dead code with no matching visible FAQ content, risking structured-data spam if accidentally used. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> Signed-off-by: slayerjain <shubhamkjain@outlook.com>
Code Review SummaryStatus: No Issues Found | Recommendation: Merge OverviewThis PR improves Keploy's documentation SEO and AI discoverability by:
The changes are well-structured documentation updates with appropriate content. No security vulnerabilities, logic bugs, or other issues were found. Files Reviewed (6 files)
Reviewed by claude-4.5-opus-20251124 · 119,203 tokens |
There was a problem hiding this comment.
Pull request overview
This PR updates Keploy documentation metadata/content and site crawling/indexing artifacts to improve SEO and AI discoverability.
Changes:
- Expanded key concept docs with richer frontmatter (
description,keywords) and introductory explanations. - Updated
robots.txtto explicitly allow major AI/search bots while disallowing Bytespider. - Added
static/llms.txtto provide an AI-friendly entrypoint summarizing Keploy docs and key links.
Reviewed changes
Copilot reviewed 6 out of 6 changed files in this pull request and generated 6 comments.
Show a summary per file
| File | Description |
|---|---|
| versioned_docs/version-4.0.0/keploy-explained/how-keploy-works.md | Adds meta description/keywords and a clearer intro explaining record/replay architecture. |
| versioned_docs/version-4.0.0/concepts/what-is-keploy.md | Updates product description and adds keywords/intro paragraph for search clarity. |
| versioned_docs/version-4.0.0/concepts/what-is-a-keploy-ebpf.md | Clarifies eBPF concept with expanded description/keywords and an explanatory intro. |
| versioned_docs/version-4.0.0/concepts/what-are-keploy-features.md | Expands features description/keywords and adds a summarized “key features” intro paragraph. |
| static/robots.txt | Adds explicit AI bot allow rules, disallows Bytespider, retains default crawler directives. |
| static/llms.txt | Introduces an AI-oriented overview file with curated links into the docs. |
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
| Allow: / | ||
|
|
||
| User-agent: OAI-SearchBot | ||
| Allow: / | ||
|
|
||
| User-agent: ChatGPT-User | ||
| Allow: / | ||
|
|
||
| User-agent: ClaudeBot | ||
| Allow: / | ||
|
|
||
| User-agent: anthropic-ai | ||
| Allow: / | ||
|
|
||
| User-agent: PerplexityBot | ||
| Allow: / | ||
|
|
||
| User-agent: Perplexity-User | ||
| Allow: / | ||
|
|
||
| User-agent: Google-Extended | ||
| Allow: / | ||
|
|
||
| User-agent: GoogleOther | ||
| Allow: / | ||
|
|
||
| User-agent: Applebot-Extended | ||
| Allow: / | ||
|
|
||
| User-agent: Meta-ExternalAgent | ||
| Allow: / | ||
|
|
||
| User-agent: CCBot | ||
| Allow: / |
There was a problem hiding this comment.
The per-user-agent groups (e.g., GPTBot/ClaudeBot/etc.) only contain Allow: /. Because crawlers use the most specific matching group, these bots will no longer inherit the Disallow: /cgi-bin/ rule from the User-agent: * group and may crawl /cgi-bin/. Consider either removing the redundant allow-groups (and only keeping the Bytespider block), or repeating Disallow: /cgi-bin/ (and any other shared directives) within each explicit user-agent group.
| Allow: / | |
| User-agent: OAI-SearchBot | |
| Allow: / | |
| User-agent: ChatGPT-User | |
| Allow: / | |
| User-agent: ClaudeBot | |
| Allow: / | |
| User-agent: anthropic-ai | |
| Allow: / | |
| User-agent: PerplexityBot | |
| Allow: / | |
| User-agent: Perplexity-User | |
| Allow: / | |
| User-agent: Google-Extended | |
| Allow: / | |
| User-agent: GoogleOther | |
| Allow: / | |
| User-agent: Applebot-Extended | |
| Allow: / | |
| User-agent: Meta-ExternalAgent | |
| Allow: / | |
| User-agent: CCBot | |
| Allow: / | |
| Allow: / | |
| Disallow: /cgi-bin/ | |
| User-agent: OAI-SearchBot | |
| Allow: / | |
| Disallow: /cgi-bin/ | |
| User-agent: ChatGPT-User | |
| Allow: / | |
| Disallow: /cgi-bin/ | |
| User-agent: ClaudeBot | |
| Allow: / | |
| Disallow: /cgi-bin/ | |
| User-agent: anthropic-ai | |
| Allow: / | |
| Disallow: /cgi-bin/ | |
| User-agent: PerplexityBot | |
| Allow: / | |
| Disallow: /cgi-bin/ | |
| User-agent: Perplexity-User | |
| Allow: / | |
| Disallow: /cgi-bin/ | |
| User-agent: Google-Extended | |
| Allow: / | |
| Disallow: /cgi-bin/ | |
| User-agent: GoogleOther | |
| Allow: / | |
| Disallow: /cgi-bin/ | |
| User-agent: Applebot-Extended | |
| Allow: / | |
| Disallow: /cgi-bin/ | |
| User-agent: Meta-ExternalAgent | |
| Allow: / | |
| Disallow: /cgi-bin/ | |
| User-agent: CCBot | |
| Allow: / | |
| Disallow: /cgi-bin/ |
| id: how-keploy-works | ||
| title: How Keploy Works? | ||
| sidebar_label: Architecture | ||
| description: Keploy uses eBPF hooks at the Linux kernel level to capture real user traffic in Record mode and replay it as production-like sandboxes in Test mode — enabling production behavior replay, dependency virtualization, and continuous validation with automatic regression detection. |
There was a problem hiding this comment.
The description says "replay it as production-like sandboxes" which reads like the traffic is being replayed as a sandbox. Consider rephrasing to replay the captured traffic/requests in a production-like sandbox environment (or similar) to avoid confusion.
| - legacy application testing | ||
| --- | ||
|
|
||
| Keploy generates tests by using eBPF hooks to intercept network packets at the Linux kernel level. In Record mode, it captures every incoming HTTP request and outgoing dependency call — database queries, API calls, message queue interactions — saving them as YAML test cases. In Test mode, it replays those requests as production-like sandboxes with all dependencies automatically virtualized, comparing responses to detect regressions. This production behavior replay enables continuous validation, migration regression testing, and legacy application testing without code changes. |
There was a problem hiding this comment.
This line mixes a few potentially confusing/incorrect terms: eBPF typically attaches to kernel hooks and can observe socket/syscall-level I/O rather than literally "intercepting network packets", and "replays those requests as production-like sandboxes" is awkward phrasing. Consider updating wording to something like capturing socket-level traffic via eBPF hooks and replaying requests in a sandboxed environment.
| Keploy generates tests by using eBPF hooks to intercept network packets at the Linux kernel level. In Record mode, it captures every incoming HTTP request and outgoing dependency call — database queries, API calls, message queue interactions — saving them as YAML test cases. In Test mode, it replays those requests as production-like sandboxes with all dependencies automatically virtualized, comparing responses to detect regressions. This production behavior replay enables continuous validation, migration regression testing, and legacy application testing without code changes. | |
| Keploy generates tests by using eBPF hooks in the Linux kernel to capture socket-level application traffic. In Record mode, it captures every incoming HTTP request and outgoing dependency call — database queries, API calls, message queue interactions — saving them as YAML test cases. In Test mode, it replays those requests in a sandboxed environment that closely mimics production, with all dependencies automatically virtualized and responses compared to detect regressions. This production behavior replay enables continuous validation, migration regression testing, and legacy application testing without code changes. |
| title: What is Keploy eBPF | ||
| sidebar_label: Keploy eBPF | ||
| description: Keploy eBPF is a language-agnostic library that captures and replays API calls and subsequent network interactions. | ||
| description: eBPF (Extended Berkeley Packet Filter) is a Linux kernel technology that Keploy uses to intercept network packets at the socket level with near-zero overhead — enabling production behavior replay, dependency virtualization, legacy application testing, and infrastructure mocking without code changes. |
There was a problem hiding this comment.
The wording "intercept network packets at the socket level" is internally inconsistent (packets are L3/L2, sockets are L4+ API) and may be technically misleading. Consider describing this as capturing socket-level traffic / syscall-level network I/O via eBPF hooks, rather than intercepting packets.
| - AI Generated Tests | ||
| --- | ||
|
|
||
| Keploy is an open-source, AI-powered testing agent and sandboxing platform that uses eBPF to automatically generate test cases, dependency mocks, and production-like sandboxes from real user traffic. It records live API calls at the Linux kernel network layer and replays them as deterministic tests — requiring zero code changes, working with any programming language or framework, and scaling test coverage with AI-driven code velocity. Keploy enables production behavior replay, dependency virtualization for databases and external APIs, legacy application testing without code changes, and migration regression testing against production baselines. |
There was a problem hiding this comment.
"Linux kernel network layer" can be read as the OSI network layer (L3). If Keploy’s capture is happening at the socket/syscall layer (as suggested elsewhere), consider using more precise phrasing (e.g., kernel socket layer / syscall-level network I/O) to avoid technical ambiguity.
| Keploy is an open-source, AI-powered testing agent and sandboxing platform that uses eBPF to automatically generate test cases, dependency mocks, and production-like sandboxes from real user traffic. It records live API calls at the Linux kernel network layer and replays them as deterministic tests — requiring zero code changes, working with any programming language or framework, and scaling test coverage with AI-driven code velocity. Keploy enables production behavior replay, dependency virtualization for databases and external APIs, legacy application testing without code changes, and migration regression testing against production baselines. | |
| Keploy is an open-source, AI-powered testing agent and sandboxing platform that uses eBPF to automatically generate test cases, dependency mocks, and production-like sandboxes from real user traffic. It records live API calls at the Linux kernel socket layer (syscall-level network I/O) and replays them as deterministic tests — requiring zero code changes, working with any programming language or framework, and scaling test coverage with AI-driven code velocity. Keploy enables production behavior replay, dependency virtualization for databases and external APIs, legacy application testing without code changes, and migration regression testing against production baselines. |
| # Keploy Documentation | ||
|
|
||
| > Technical documentation for Keploy, an open-source AI-powered testing agent and sandboxing platform that automatically generates test cases, dependency mocks, and production-like sandboxes from real user traffic using eBPF kernel technology. Keploy keeps testing aligned with AI-driven code velocity — achieving 90% test coverage in minutes with zero code changes. |
There was a problem hiding this comment.
PR description mentions introducing a new FAQSchema.jsx component for structured FAQ JSON-LD, but this PR’s changed file set doesn’t include that component. If the component isn’t actually part of this PR (or wasn’t updated here), consider updating the PR description to avoid confusion for reviewers/release notes.
This pull request introduces several improvements to Keploy's documentation and site metadata, focusing on clearer explanations of core concepts, enhanced SEO and discoverability, and improved support for AI and search engine indexing. The most important changes include more comprehensive descriptions of Keploy features and architecture, the addition of a structured FAQ schema component, and updates to
robots.txtto allow major AI agents and bots.Documentation content and clarity improvements:
Updated feature and concept pages (e.g.,
what-is-keploy.md,what-are-keploy-features.md,how-keploy-works.md,what-is-a-keploy-ebpf.md) to provide clearer, more detailed descriptions of Keploy’s AI-powered testing, eBPF-based traffic capture, production-like sandboxing, and other core capabilities. Added relevant keywords for improved searchability. [1] [2] [3] [4] [5] [6]Added a new documentation file,
llms.txt, summarizing Keploy’s features, use cases, and integration guides in a format suitable for AI and search engine consumption.SEO and AI discoverability enhancements:
Introduced a new React component,
FAQSchema.jsx, that generates and injects a structured FAQ schema (FAQPageJSON-LD) for better search engine and AI assistant understanding of FAQ content.Updated
robots.txtto explicitly allow major AI bots and search-related crawlers (e.g., GPTBot, OAI-SearchBot, ClaudeBot, PerplexityBot, Google-Extended, etc.) while disallowing Bytespider, improving Keploy’s visibility in AI-powered search and assistant platforms.## What has changed?Please include a summary of the change.
This PR Resolves #(issue)
Type of change
Please delete options that are not relevant.
How Has This Been Tested?
Please run npm run build and npm run serve to check if the changes are working as expected. Please include screenshots of the output of both the commands. Add screenshots/gif of the changes if possible.
Checklist: