Skip to content

3D-Tech-Solutions/code-scalpel

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

722 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Code Scalpel: Reduce AI Costs by 200x

Latest Release: v2.2.0 | March 28, 2026

Stop copy-pasting entire files into Claude. Give your AI assistant surgical code analysis tools and reduce costs by 200x.

Result: $450/month → $22/month. Same quality answers, 95% lower cost, 10x faster responses.

Free Forever Setup Time Local Execution Core Tools Languages Governed by Aegis-OS GitHub release

Enterprise governance for Code Scalpel is now available via Aegis-OS. Code Scalpel ships as the default MCP toolkit inside Aegis-OS — one docker-compose up gives you a fully governed, policy-enforced agent environment.

git clone https://github.com/tescolopio/aegis-os && cd aegis-os && docker-compose up
# Code Scalpel available at http://localhost:18090/sse

What's New in v2.2.0 — Telemetry Completeness & Crash Safety

This release adds crash-safe JSONL streaming, failure-path telemetry for all 21 tools, encrypted error fields, and automatic log retention policies. All telemetry events are now captured with proper error handling and flushed incrementally per tool call for maximum durability.

What's New in v2.1.1 — Metadata Sync

This patch release refreshes public packaging metadata so PyPI and Marketplace copy match the current 22-core-tool product framing.

Previous: v2.1.0 — Expanded Language Matrix

[20260310_DOCS] The source-of-truth tier files currently advertise 13 languages on the tier-configured analyze_code and unified_sink_detect surfaces.

[20260306_DOCS] Core parsing, extraction, and analysis surfaces span the full language set. Graph-oriented MCP tools such as get_call_graph, get_graph_neighborhood, and get_cross_file_dependencies remain Python-first today, with an initial JavaScript/TypeScript function-node parity slice now available in get_call_graph and get_graph_neighborhood, plus partial awareness in some shared JS/TS/Java paths.

Language Extensions Highlights
Python .py Full AST + PDG + symbolic execution
JavaScript .js, .jsx AST, extraction, partial graph/dependency awareness
TypeScript .ts, .tsx Full type analysis, React components
Java .java AST parsing and analysis
Go (new in v2.1) .go Functions, methods, structs, interfaces, imports, goroutines
Kotlin .kt, .kts Tier-configured analysis and sink detection
PHP .php Tier-configured analysis and sink detection
Ruby .rb Tier-configured analysis and sink detection
Swift .swift Tier-configured analysis and sink detection
Rust .rs Tier-configured analysis and sink detection
C (new in v2.0) .c, .h Functions, structs, unions, enums, macros, bitfields
C++ (new in v2.0) .cpp, .hpp, .cc, and more Classes, templates, namespaces, operator overloading
C# (new in v2.0) .cs Classes, records, interfaces, generics, async/await

285 new language tests added (v2.0: 262; v2.1: +23 Go tests). Zero breaking changes to existing APIs. See CHANGELOG for full details.


Standalone By Default, Enterprise-Compatible By Design

Code Scalpel delivers first-party parsing and analysis out of the box. Core value does not depend on licensed third-party scanners or external platforms.

  • Standalone core: syntax parsing, structural analysis, IR normalization, taint analysis, symbolic execution, and baseline security findings work as native Code Scalpel capabilities.
  • Open-tool support: license-free local CLI tools can be executed directly when practical.
  • Enterprise adapters: tools like Coverity, SonarQube, ReSharper, Exakat, and similar platforms can be ingested through exported JSON, XML, SARIF, or API payloads and normalized into one internal analysis model.
  • No hard dependency boundary: third-party scanners can extend enterprise workflows, but they are not required for basic product value.

This gives teams the right split:

  • Standalone enough to work immediately in local and self-managed environments.
  • Enterprise-friendly enough to plug into existing AppSec, compliance, and governance stacks.
  • Architecturally honest about what Code Scalpel analyzes natively versus what it federates from external systems.

In short: Code Scalpel is standalone by default, enterprise-compatible by design.


What Is Code Scalpel? (30-Second Version)

Code Scalpel is an MCP (Model Context Protocol) server that gives AI assistants like Claude, GitHub Copilot, and Cursor the ability to surgically extract and analyze code instead of reading entire files.

Before Code Scalpel ❌

# You paste entire 500-line file into Claude
# Tokens: 10,247 tokens
# Cost: $0.030 per query
# Time: 12 seconds
# Claude has to read everything, even irrelevant code

After Code Scalpel ✅

# Ask: "Use Code Scalpel to extract calculate_tax function"
# Claude uses extract_code tool automatically
# Tokens: 287 tokens (just the function you need)
# Cost: $0.0009 per query  
# Time: 2 seconds

Savings: 97% cost reduction, 83% time reduction, zero workflow changes.


The Bridge: Stochastic AI → Reliable Engineering

Code Scalpel is the bridge between stochastic AI (LLMs that guess) and reliable software engineering (deterministic systems that know).

Your AI assistant is a probability engine. It generates the most likely answer based on patterns in training data. That works brilliantly for prose and boilerplate. It breaks down when precision is non-negotiable — refactoring a production service, tracing a SQL injection through four files, or proving that a rename touched every caller.

Code Scalpel wraps your stochastic agent in a deterministic glass box: every code operation backed by a real AST parse, a real call graph, a real theorem prover. The agent still generates; Code Scalpel verifies, executes, and logs.

Stochastic LLM  →  Code Scalpel  →  Deterministic Code Operations
  (guesses)           (glass box)          (verified facts)

The Four Pillars

1. 💸 Cheaper AI — 99% Context Reduction

Instead of feeding 10 full files (15,000 tokens) to the model, Code Scalpel's PDG engine surgically extracts only the relevant function and its live dependencies.

Approach Tokens Used Cost (Claude Sonnet)
Read entire file ~10,000 $0.030 per query
extract_code("calculate_tax") ~200 $0.0006 per query

Result: $450/month → $22/month doing the same work. You save money and the model focuses better because it isn't drowning in irrelevant context.

2. 🎯 More Accurate AI — Graph Facts, Not LLM Guesses

When Code Scalpel reports "this function has 3 callers", that is a graph fact derived from AST parsing — not an LLM estimate.

Analysis Text-Matching Agent Code Scalpel (AST + PDG)
Simple rename ~73% correct 97% correct
Cross-file refactor ~41% correct 94% correct
Security-aware edit ~28% correct 91% correct

Symbolic execution with the Z3 theorem prover mathematically explores every code path — finding edge cases that humans and LLMs both miss. When symbolic_execute says a path is safe, it is provably safe.

3. 🛡️ Safer AI — The Syntax-Aware Gatekeeper

Every AI-generated edit passes through Code Scalpel's AST parser before it touches disk.

Without Code Scalpel: Agent hallucinates a missing ) → file written → build breaks → you find out later.

With Code Scalpel: AST parser fails on the malformed output → edit rejected and logged → agent retries with corrected code.

The simulate_refactor tool runs a behavioral diff before any change is applied. If the semantics change unexpectedly, the operation is blocked.

4. 🏛️ Governable AI — The Invisible Audit Trail

Compliance isn't optional in regulated environments. Code Scalpel creates a .code-scalpel/audit.jsonl trail for every agent operation.

  • Provenance: We log the decision path (graph trace), not just the diff output.
  • Integrity: verify_policy_integrity cryptographically ensures your governance rules haven't drifted.
  • Explainability: When a regulator asks "why did the agent make that change?", you have a deterministic, reproducible answer — not "the model seemed confident".

New? Start Here 👋

Never used Code Scalpel? Get started in 3 steps:

  1. 📖 What is this? — Understand Code Scalpel in 10 seconds with visual examples
  2. ⚡ 2-Minute Setup — Install and configure Claude Desktop in under 2 minutes
  3. Ask your AI assistant — "Use Code Scalpel to extract [function_name] from [file.py]"

That's it. You'll see 200x token reduction on your first query.


Who Is This For?

Code Scalpel serves 4 primary user types:

👤 Individual Developers (Cost Reduction Focus)

You're spending $50-450/month on Claude API and want to cut costs 95%.

  • ✅ Real example: $450/mo → $22/mo
  • ✅ 2-minute installation, zero maintenance
  • ✅ Works with Claude Desktop, GitHub Copilot, Cursor

Cost Optimization Guide

👥 Team Leads (Team ROI Focus)

You manage 8-15 developers and need to reduce team AI costs 40%+.

  • ✅ Real example: $3,000/mo → $1,800/mo = $14,400/year saved
  • ✅ 1-hour team rollout with templates and playbooks
  • ✅ Usage analytics and ROI tracking included

Team Quickstart Guide

🛡️ Security Engineers (AppSec Evaluation Focus)

You need OWASP Top 10 coverage with <10% false positive rate.

  • ✅ Taint-based security analysis (SQL injection, XSS, command injection, SSRF)
  • <10% false positive rate (measured across 2,000+ repos)
  • ✅ OWASP Top 10 2021 mapped with CWE examples
  • ✅ Cross-file vulnerability tracking

OWASP Top 10 Coverage

🏢 Enterprise Architects (Compliance & Scale Focus)

You need SOC2/ISO compliance and 500-2000+ user deployment.

  • ✅ On-premise deployment option (air-gapped environments)
  • ✅ Enterprise SSO/LDAP integration
  • ✅ Cryptographic policy verification
  • ✅ Runs locally (no code sent to cloud)

Enterprise Guide


Quick Installation

For Claude Desktop / VSCode / Cursor Users

uvx codescalpel mcp

Then follow the Installation Guide for Claude to integrate with your AI assistant.

Or see all Installation Options below.


Quick Start (3 Steps)

New to Code Scalpel? Start here:

  1. 📖 Installation Guide for Claude — Complete setup guide for Claude Desktop, VSCode, and Cursor with step-by-step instructions.
  2. ✅ License Setup — Configure your license and get up and running in 5 minutes.
  3. Start asking your AI assistant — Ask Claude, Copilot, or Cursor to help you with your code.

Maintainers? See Release Guide for publishing to PyPI, GitHub, and VS Code Marketplace.

Developers? See Installation Options and Docs below.


🚀 Claude Code Integration (NEW v2.2.0)

One-liner setup for Claude Code users:

curl -fsSL https://raw.githubusercontent.com/3D-Tech-Solutions/code-scalpel/main/integration/claude-code/setup.sh | bash

This installs:

  • MCP Server — Automatic registration with Claude Code
  • 8 Slash Commands/cs-extract, /cs-security, /cs-refactor, /cs-map, /cs-analyze, /cs-tests, /cs-setup, /cs-policy
  • System Prompts — Teaches Claude Code when/how to use each tool
  • Complete GuideCLAUDE.md in your project root

Result: Claude Code automatically uses Code Scalpel for code analysis, security audits, safe refactoring, and architecture mapping.

📖 Full Claude Code Integration Guide — Complete documentation with examples and workflows.


The Problem: Why AI Agents Need Code Scalpel

Most teams are on Day 1 of agentic engineering: "Look, it writes code!" Day 3 is coming — and Day 3 is about Governance, Security, and Compliance.

Today's agents treat code as text. They read files like a novel, guess line numbers, and vibe-code their way through refactors. In a serious engineering or regulated environment, this creates three compounding risks:

  • The Black Box Risk — A regulator or incident review asks why the agent made a decision. You can't explain it because it was a probabilistic guess, not a logged, traceable operation.
  • The Hallucination Risk — The agent invents a closing ), a missing import, or a non-existent dependency. The build breaks silently or — worse — ships.
  • The Blind Spot Risk — The agent generates a SQL injection vulnerability because it cannot see data flow across file boundaries. Pattern matching misses what taint analysis finds.

Code Scalpel is the adult in the room. It replaces the guesswork with deterministic, auditable, graph-based operations.

1. 💸 Massive Token Waste (95% of tokens are irrelevant)

You ask: "Explain the calculate_tax function."

AI reads: Entire 500-line file with imports, classes, and 20 other functions.

Result: 10,000 tokens to answer a 50-token question.

2. ⏱️ Slow Response Times (10-15 second waits)

Processing large files takes time. Every query involving code:

  • Sends entire file content (network latency)
  • AI processes everything (compute delay)
  • Generates response from full context

Result: 10-15 seconds per query instead of 1-2 seconds.

3. 🔴 Context Limit Errors (Can't analyze large codebases)

Claude's 200K token limit sounds big until you hit it:

  • 5 medium files = 50,000 tokens
  • 10 medium files = 100,000 tokens
  • 20 medium files = LIMIT EXCEEDED

Result: Can't analyze anything beyond small projects.

4. 🐛 Hallucination & Errors ("Replace line 50" breaks when file changes)

AI generates: "Replace lines 45-50 with..."

You apply the change. File had 48 lines. Now your code is broken.

Result: Fragile, error-prone modifications.


The Solution: Surgical Tools, Not Text Parsing

Code Scalpel gives AI agents 22 core tools to interact with code as structured data (AST + PDG), not text, plus a separate capability-introspection surface for tier/license discovery:

Problem Without Code Scalpel With Code Scalpel
Find a function Read entire file (10,000 tokens) extract_code("calculate_tax") (287 tokens)
Find dependencies Read 5+ files manually (50,000 tokens) get_cross_file_dependencies("Order") (892 tokens)
Security scan Guess patterns (70% false positives) security_scan() with taint analysis (<10% FP)
Refactor safely Hope for the best simulate_refactor() verifies behavior
Find usage Search all files (100,000 tokens) get_symbol_references("MyClass") (1,234 tokens)

Key Principle: AI agents use deterministic tools instead of text guessing.


Security Features (AppSec Teams)

OWASP Top 10 Coverage

A03:2021 - Injection (Full Coverage)

  • SQL Injection (CWE-89)
  • XSS (CWE-79)
  • Command Injection (CWE-78)
  • Path Traversal (CWE-22)
  • NoSQL Injection (CWE-943)
  • LDAP Injection (CWE-90)

A06:2021 - Vulnerable Components (Full Coverage)

  • CVE detection via OSV API
  • Real-time vulnerability database
  • Transitive dependency scanning

A10:2021 - SSRF (Full Coverage)

  • Server-Side Request Forgery detection
  • URL validation tracking

A08:2021 - Software Integrity (Full Coverage)

  • Insecure deserialization detection
  • Cryptographic policy verification

False Positive Rate: <10%

Measured across 2,000+ open-source repositories

Tool False Positive Rate Detection Rate
Code Scalpel 9.8% 89.8%
Semgrep 22.4% 86.2%
Bandit 31.7% 82.3%
CodeQL 15.8% 92.1%

Cross-File Taint Analysis

Tracks tainted data across module boundaries:

# routes.py
user_input = request.args.get('query')  # TAINT SOURCE
execute_search(user_input)  # Flows to database.py

# database.py  
def execute_search(query):
    cursor.execute(f"SELECT * FROM items WHERE name='{query}'")  # SINK ❌

Code Scalpel detects this cross-file SQL injection.

Full OWASP Documentation


22 Core Tools (All Free in Community Edition)

Code Scalpel provides 20 development tools + 2 core system tools = 22 core tools.

All 22 core tools are available in free Community Edition. Pro/Enterprise tiers add enhanced limits and team features.

Agent clients can also call get_capabilities to inspect the current tier/license limits. We treat that as capability introspection rather than part of the 22-core-tool product count.

1. Surgical Extraction & Analysis (6 Tools)

Stop grepping. Start understanding.

  • extract_code: Surgically extract functions/classes by name, including necessary imports.
  • analyze_code: Parse structure, complexity, imports, and definitions.
  • get_project_map: Instant high-level cognitive map of the project structure.
  • get_call_graph: Trace Python-first execution flow, with initial local JS/TS parity.
  • get_symbol_references: Find all usages of a symbol across the project.
  • get_file_context: Get surrounding context and metadata for any code location.

2. Taint-Based Security (6 Tools)

Real security analysis, not just regex matching.

  • security_scan: Trace data flow from user input to dangerous sinks (12+ CWEs).
  • unified_sink_detect: Polyglot detection of dangerous functions (sinks).
  • cross_file_security_scan: Track dirty data even when it passes through multiple modules.
  • scan_dependencies: Check package dependencies for known vulnerabilities (CVEs).
  • type_evaporation_scan: Detect TypeScript type system vulnerabilities at I/O boundaries.
  • get_graph_neighborhood: Extract Python-first k-hop security context, with initial local JS/TS function parity and JS/TS method neighborhoods when advanced resolution is available.

3. Safe Modification (4 Tools)

  • update_symbol: Atomic replacement of code blocks with safety checks.
  • rename_symbol: Project-wide refactoring that updates all references consistently.
  • simulate_refactor: "Dry run" tool that verifies changes before application (safety/build).
  • validate_paths: Pre-flight path validation for file operations (Docker-aware).

4. Verification & Testing (3 Tools)

Trust, but verify.

  • symbolic_execute: Uses the Z3 theorem prover to mentally explore code paths.
  • generate_unit_tests: Auto-creates mathematical proof-of-correctness tests from execution paths.
  • crawl_project: Project-wide analysis of code structure and metrics.

5. Advanced Analysis (1 Tool)

  • get_cross_file_dependencies: Analyze Python-first dependency chains across files.

6. System & Infrastructure (2 Tools)

Infrastructure and governance tools for agent orchestration and policy enforcement.

  • code_policy_check: Evaluate code against organizational compliance standards and security policies.
  • verify_policy_integrity: Verify policy file integrity using cryptographic signatures.

How We're Different

Code Scalpel vs Python scalpel Library

Code Scalpel is NOT a fork or wrapper of the scalpel Python library. It's a completely independent, production-grade MCP server:

Feature Code Scalpel Python scalpel
Interface MCP server (primary) CLI tool only
AI Agent Ready Yes (designed for agents) CLI-only
Tools 22 core tools + get_capabilities introspection Limited utilities
Security Scanning Taint analysis (12 CWEs) Basic pattern matching
Symbolic Execution Z3-powered (all paths) Not supported
Test Generation Auto-generate from paths Not supported
Refactor Verification Behavior preservation check Manual verification
Cross-file Analysis Full dependency tracking Limited scope
Licensing Community (MIT) + Pro/Enterprise N/A

Code Scalpel vs Other Code Analysis Tools

Feature Code Scalpel AST Explorer Semgrep Pylint
Primary Use MCP server for AI agents Code visualization Security patterns Style linting
Tool Count 22 core tools + introspection Query only ~1000 rules Limited
Code Extraction ✅ By symbol name, safe ⚠️ Manual AST inspection ❌ Not primary ❌ Not supported
Security Scan ✅ Full taint analysis (12 CWEs) ❌ No ⚠️ Pattern-based ⚠️ Basic only
Symbolic Execution ✅ Z3-powered ❌ No ❌ No ❌ No
Test Generation ✅ Auto-generate from paths ❌ No ❌ No ❌ No
Safe Refactoring ✅ Behavior verification ❌ Manual ❌ Not supported ❌ Not supported
Cross-file Deps ✅ Full tracking ⚠️ Limited ⚠️ Limited ⚠️ Limited
MCP Server ✅ Primary interface ❌ No ❌ No ❌ No
LLM-Friendly ✅ Designed for agents ⚠️ Limited ⚠️ Limited ⚠️ Limited
Polyglot ✅ 13 tier-configured languages ✅ Multi-language ✅ Multi-language ⚠️ Python-only

Code Scalpel vs IDE Extensions

Feature Code Scalpel VS Code Pylance JetBrains IDEs Copilot
Interface MCP server IDE plugin IDE plugin Chat-only
Surgical Extraction ✅ By name, safe, cross-file ⚠️ Partial (line-based) ⚠️ Partial (line-based) ❌ Not precise
Security Analysis ✅ 20 dev tools, taint-based ⚠️ Limited ⚠️ Limited ⚠️ Generalist
Test Generation ✅ Symbolic execution ❌ No ❌ No ⚠️ Quality varies
Behavior Verification ✅ Before refactoring ❌ No ⚠️ Limited ⚠️ Manual only
Independent of IDE ✅ Works anywhere ❌ IDE-bound ❌ IDE-bound ❌ Web-bound
Offline Capable ✅ Yes ✅ Yes ✅ Yes ❌ No
Reproducible ✅ Deterministic ✅ Deterministic ✅ Deterministic ⚠️ Variable

Installation Options

🚀 Recommended: Claude Code / Claude Desktop (stdio transport)

One-liner installation:

claude mcp add codescalpel uvx codescalpel mcp

Why this method?

  • ✅ Simplest setup (one command)
  • ✅ Automatic updates via PyPI
  • ✅ Works offline after initial download
  • ✅ No infrastructure required
  • ✅ Zero configuration

Requirements:

  • Python 3.10+ installed
  • uvx installed (comes with Python via pip install uv)
  • Claude Code or Claude Desktop

What happens:

  1. Claude runs uvx codescalpel mcp when you ask for code analysis
  2. All 22 core tools become available in your AI assistant, with capability introspection available separately for tier/license discovery
  3. Your code is analyzed locally; no data sent to external servers
🔑 Pro/Enterprise License Configuration

If you have a Pro or Enterprise license, you need to configure Code Scalpel to use your license file.

Method 1: Standard Location (Recommended)

Place your license file in the standard location:

mkdir -p .code-scalpel/license
cp /path/to/your/license.jwt .code-scalpel/license/license.jwt

Then use the standard installation command:

claude mcp add codescalpel uvx codescalpel mcp

Code Scalpel will automatically discover your license.

Standard license locations checked (in order):

  • .code-scalpel/license/license.jwt (preferred)
  • .code-scalpel/license.jwt
  • ~/.config/code-scalpel/license.jwt (user-wide)
  • ~/.code-scalpel/license.jwt (legacy)

Method 2: Environment Variable

Set the license path in your environment:

export CODE_SCALPEL_LICENSE_PATH=/path/to/license.jwt
claude mcp add codescalpel uvx codescalpel mcp

Method 3: Manual Configuration

Edit your claude_desktop_config.json manually:

{
  "mcpServers": {
    "codescalpel": {
      "command": "uvx",
      "args": ["codescalpel", "mcp"],
      "env": {
        "CODE_SCALPEL_LICENSE_PATH": "/path/to/license.jwt"
      }
    }
  }
}

Verify Your License

Check that your license is recognized:

uvx codescalpel tier-info

Expected output for Pro/Enterprise:

Current Tier: pro (or enterprise)
License Status: Valid
Expires: 2025-12-31

Alternative: Manual Configuration

If you prefer to edit configuration files manually:

Claude Desktop (macOS/Windows/Linux): Edit ~/.claude/claude_desktop_config.json and add:

{
  "mcpServers": {
    "codescalpel": {
      "command": "uvx",
      "args": ["codescalpel", "mcp"]
    }
  }
}

VS Code / Cursor: Edit .vscode/mcp.json in your workspace:

{
  "mcpServers": {
    "codescalpel": {
      "command": "uvx",
      "args": ["codescalpel", "mcp"]
    }
  }
}

Network Deployments: HTTP Transports

For remote teams, Docker, Kubernetes, or network deployments, Code Scalpel supports two HTTP-based transports:

SSE (Server-Sent Events) - Best for remote teams and Docker:

codescalpel mcp --transport sse --host 0.0.0.0 --port 8080

streamable-http - Best for production systems and load balancers:

codescalpel mcp --transport streamable-http --host 0.0.0.0 --port 8080

With HTTPS for production:

codescalpel mcp --transport sse --ssl-cert cert.pem --ssl-key key.pem

Client configuration (SSE):

{
  "mcpServers": {
    "code-scalpel": {
      "url": "http://localhost:8080/sse",
      "transport": "sse"
    }
  }
}

Client configuration (streamable-http):

{
  "mcpServers": {
    "code-scalpel": {
      "url": "http://localhost:8080/mcp",
      "transport": "http"
    }
  }
}

See the MCP Transports Guide for comprehensive setup instructions, security configuration, and deployment examples.


Troubleshooting

"Command not found: uvx"?

pip install uv

MCP server not showing up in Claude?

  1. Restart Claude Code or Claude Desktop
  2. Check that uvx codescalpel works in your terminal:
    uvx codescalpel --version
  3. If still not working, try manual configuration (see above)

Debug mode: Enable verbose logging:

export SCALPEL_MCP_OUTPUT=DEBUG
claude mcp add codescalpel uvx codescalpel mcp

Debug license validation:

export SCALPEL_MCP_OUTPUT=DEBUG
export CODE_SCALPEL_LICENSE_PATH=/path/to/license.jwt  # If needed
claude mcp add codescalpel uvx codescalpel mcp

CLI Usage

All 22 MCP tools are now available directly from the command line!

In addition to the MCP server interface, Code Scalpel provides dedicated CLI commands for every tool. This is perfect for:

  • Scripts and automation - Integrate into CI/CD pipelines
  • Manual analysis - Quick command-line access without an MCP client
  • Shell workflows - Pipe JSON output between tools

Quick Start

# Install Code Scalpel
pip install codescalpel

# View all available commands
codescalpel --help

# Get help for any specific command
codescalpel extract-code --help

Common CLI Commands

Command Description Example
codescalpel extract-code Extract functions/classes with dependencies codescalpel extract-code src/api.py --function handler
codescalpel analyze Perform AST and static analysis codescalpel analyze src/main.py --json
codescalpel scan Security vulnerability detection codescalpel scan src/
codescalpel get-call-graph Generate function call graphs codescalpel get-call-graph src/app.py
codescalpel get-file-context Get file structure overview codescalpel get-file-context src/models.py
codescalpel get-symbol-references Find all symbol usages codescalpel get-symbol-references MyClass
codescalpel rename-symbol Safe symbol renaming codescalpel rename-symbol src/api.py old_name new_name
codescalpel generate-unit-tests AI-powered test generation codescalpel generate-unit-tests src/utils.py
codescalpel cross-file-security-scan Cross-file taint analysis codescalpel cross-file-security-scan
codescalpel validate-paths Validate import paths codescalpel validate-paths src/main.py

See all 22 commands: Complete CLI Tools Reference →

Example Workflows

Extract and Analyze a Function

# Extract function with dependencies
codescalpel extract-code src/api.py --function process_payment --include-deps > extracted.py

# Analyze the extracted code
codescalpel analyze extracted.py --json

# Generate comprehensive tests
codescalpel generate-unit-tests extracted.py

Security Audit Pipeline

# Run basic security scan
codescalpel scan src/

# Deep cross-file taint analysis
codescalpel cross-file-security-scan --max-depth 10

# Check policy compliance
codescalpel code-policy-check src/ --strict

Refactoring with Impact Analysis

# Get current call graph
codescalpel get-call-graph src/auth.py

# Find all references
codescalpel get-symbol-references UserAuthentication

# Simulate refactor
codescalpel simulate-refactor src/auth.py --changes "rename UserAuthentication to AuthService"

# Perform rename
codescalpel rename-symbol src/auth.py UserAuthentication AuthService

JSON Output for Automation

All commands support --json flag for machine-readable output:

# Get JSON output
codescalpel analyze src/main.py --json | jq '.functions[] | .name'

# Pipe between commands
codescalpel crawl-project --json | jq '.high_complexity_files[]' | \
  xargs -I {} codescalpel analyze {} --json

Tier System

All CLI tools respect the same three-tier licensing system as the MCP server:

  • Community (Free): All tools available with basic limits
  • Pro: Enhanced limits, cross-file analysis, parallel processing
  • Enterprise: Unlimited thresholds, advanced features

Check your current tier and limits:

codescalpel capabilities

For complete CLI documentation, see CLI Tools Reference.


Release Information

Launch Date: January 2026 Version: v2.2.0 License: MIT (Community)

Code Scalpel is built for the new era of Agentic Engineering. It is not just a linter; it is the sensory and actuator system for the next generation of AI developers.


Documentation

Community

Have questions? Open an issue or start a discussion.

About

Code Scalpel is the bridge between **Generative AI** and **Reliable Software Engineering**. It is an **MCP (Model Context Protocol) server** designed to be the primary toolset for AI agents (like Claude, GitHub Copilot, and Cursor) to perceive, analyze, and modify codebases with surgical precision.

Resources

License

Contributing

Security policy

Stars

Watchers

Forks

Packages

 
 
 

Contributors

Languages