A modern diagnostic plugin for Minecraft servers designed to detect hidden plugin conflicts, compatibility issues and technical risks before they become real server problems.
It scans your plugin environment and helps administrators understand
why strange behavior happens - whether that means broken commands, dependency issues, duplicate libraries or overlapping listeners.
Plugin Conflict Detector works with
different analysis levels, allowing you to choose how deep the scan should go:
•
Basic → fast checks for common and visible issues
•
Advanced → deeper inspection of plugin interaction and risks
•
Developer → full deep-dive including internals, listeners and jar-level conflicts
This makes it suitable for both quick maintenance checks and full debugging sessions.
Almost every result is structured in a practical way, so you can quickly identify the affected plugins and understand what actually needs attention.
» Detect
command conflicts between plugins
» Analyze
dependencies, soft-dependencies and load-order issues
» Identify suspicious or overlapping
event listener situations
» Detect duplicate or conflicting
libraries inside plugin jars » Inspect permissions, services and plugin metadata
» Generate a structured
risk overview for your server
» Supports
multiple analysis levels from basic to developer mode
» Export reports in
TXT, JSON, YAML, Markdown and HTML » Useful for both
server owners and
developers » Lightweight and focused on practical diagnostics
» Helps find problems
before your players do
Plugin Conflict Detector was built to make plugin troubleshooting easier, faster and much more transparent.
Quick, how?» Use
Basic analysis for instant results.
Detailed, how?» Switch to
Advanced for deeper inspection.
Developer-level, how?» Use
Developer mode to analyze internals and libraries.
The plugin analyzes your loaded server environment and highlights issues that are often difficult to detect manually.
Depending on the selected
analysis level, the depth of this inspection can vary from a quick overview to a full technical breakdown.
It can inspect things like: • plugin commands
• dependency declarations
• event listeners
• permissions
• registered services
• plugin metadata
• bundled jar libraries
This makes it much easier to troubleshoot weird plugin behavior, especially on larger servers with many installed plugins.
The following shows an example of a
simple analysis (Basic level) on a well-configured server.
Analysis results can also be exported into structured reports for easier review and sharing.
The
HTML output is especially useful if you want a clean and readable overview of detected issues, affected plugins, warnings and risk levels.
The amount of detail inside these reports depends on the chosen
analysis level, making it useful for both quick summaries and deep technical debugging.
This is ideal for: • debugging complex server issues
• sharing results with developers
• documenting problems for later review
• quickly understanding large plugin stacks
Command
Permission
Description
Code (Text):
/conflictcheck check
Code (Text):
pluginconflict.admin
Runs the standard conflict analysis.
Code (Text):
/conflictcheck verbose
Code (Text):
pluginconflict.admin
Runs a more detailed analysis with extended output.
Code (Text):
/conflictcheck save <txt|json|yaml|md|html>
Code (Text):
pluginconflict.admin
Generates and saves a report in the selected format.
Code (Text):
/conflictcheck profile
Code (Text):
pluginconflict.admin
Shows the current analysis profile or level.
Code (Text):
/conflictcheck help
Code (Text):
pluginconflict.admin
Shows all available Plugin Conflict Detector commands.
Code (Text):
/pconflict
Code (Text):
pluginconflict.admin
Alias for the main command.
Code (Text):
/plugincheck
Code (Text):
pluginconflict.admin
Alternative alias for the main command.
Permission
Description
Code (Text):
pluginconflict.*
Grants access to all Plugin Conflict Detector permissions.
Code (Text):
pluginconflict.admin
Allows running analyses, viewing results and generating reports.
Code (Text):
pluginconflict.update.notify
Receive notifications when a plugin update is available.
Code (Text):
[/LEFT]
# PluginConflictDetector Configuration
# This plugin is read-only and safe to use on production servers.
# -----------------------------------------------------------------------
# Analysis Profile
# -----------------------------------------------------------------------
# Selects the default analysis profile. Each profile bundles a sensible
# set of defaults for a specific audience.
#
# BASIC — Commands, Dependencies, Services, Metadata only.
# WARNING+ severity. SIMPLE output. Best for regular admins
# who just want to know if something is visibly broken.
#
# ADMIN — All checkers enabled. WARNING+ severity. DETAILED output.
# Recommended default for most server operators.
#
# DEVELOPER — All checkers + soft-dependency warnings + INFO level.
# DETAILED output. For plugin developers debugging issues.
#
# FULL — Everything, every severity, TECHNICAL output.
# Use for deep diagnostics or when filing a bug report.
profile:
active: BASIC
# Output mode controls how much detail appears in the HTML report.
# Leave blank to use the profile's default.
# SIMPLE — Type name + description only.
# DETAILED — + Recommendation field. (ADMIN/DEVELOPER default)
# TECHNICAL — + Detail field, Type IDs, severity codes. (FULL default)
output-mode: ""
# Per-checker overrides — leave a key absent to inherit from the profile.
overrides:
# report-info: false
# report-soft-deps: false
# run-event-checker: true
# run-permission-checker: true
# run-jar-library-checker: true
# run-log-analyzer: true
# performance-listener-threshold: 15
# max-chat-results: 20
# -----------------------------------------------------------------------
# General Settings
# -----------------------------------------------------------------------
# Directory where saved reports are written (relative to the plugin data folder).
reports-directory: reports
# Path to the server log file used by the log analyzer.
# Relative paths are resolved from the server's working directory.
# Change this if you run the server from a non-standard directory or use a wrapper.
log-file: logs/latest.log
# Log a brief summary to the console whenever an analysis is run.
log-to-console: true
# Default export format when using /conflictcheck save without a format argument.
# Options: txt, json, yaml, md, html
default-export-format: html
# -----------------------------------------------------------------------
# Whitelist / Ignore Rules
# Matching entries are silently dropped from the report.
# -----------------------------------------------------------------------
whitelist:
# Plugin pairs whose mutual conflicts should be ignored.
# Each entry is a list of exactly two plugin names (case-insensitive).
# Example:
# plugin-pairs:
# - [EssentialsX, CMI]
plugin-pairs: []
# Bukkit service class names to ignore when checking duplicate providers.
# Example:
# services:
# - "net.milkbowl.vault.economy.Economy"
services: []
# Event names whose listener-overlap findings should be suppressed.
# Example:
# event-overlaps:
# - "PlayerMoveEvent"
event-overlaps: []
# Command alias names whose alias-conflict findings should be suppressed.
# Example:
# alias-conflicts:
# - "tp"
alias-conflicts: []
# Permission nodes whose conflict findings should be suppressed.
# Example:
# permission-nodes:
# - "some.shared.permission"
permission-nodes: []
[LEFT]
• Intended for administrators and developers
• Developer-level analysis may produce much more detailed output
• Best used on servers with multiple plugins where hidden conflicts are harder to spot
Please
DO NOT leave bad reviews for issues.
If you encounter problems, please contact me via PM or the discussion tab first.