| CPC G06F 8/34 (2013.01) | 20 Claims |

|
1. A method, comprising:
receiving a declarative specification of a search pattern for a refactoring candidate code portion of a graph visual programming language code, wherein the declarative specification of the search pattern specifies a visual programming logic flow including a plurality of connected nodes having a wildcard node with a wildcard search specification, wherein the graph visual programming language code includes a visual representation provided by a user via a graphical user interface of a visual programming environment that is displayed to the user to allow user interaction that facilitates a visual construction and modification of the graph visual programming language code, and wherein the wildcard node represents a structural element in the visual programming logic flow having a sequence of one or more nodes or a subgraph of one or more nodes in the visual programming logic flow;
analyzing a repository of graph based visual programming language code instances to identify at least a portion of a visual programming language code instance of the repository that matches the search pattern, including by being configured to automatically map the plurality of connected nodes of the search pattern to corresponding nodes of the graph based visual programming language code instances;
providing an indication of at least the portion of the visual programming language code instance of the repository that matches the search pattern, including by being configured to identify based on the search pattern, specific nodes within the matched portion of the visual programming language code instance of the repository; and
restructuring at least the portion of the visual programming language code instance of the repository that matches the search pattern for the refactoring candidate code portion of the graph visual programming language code based on the identified specific nodes to improve graph visual programming language code quality by removing an inefficiency or a security vulnerability.
|