Code Scalpel
Code Scalpel is an MCP server that upgrades your AI coding agent with surgical, graph-based tools for precise analysis, atomic refactoring, and 99% lower token costs.
Code Scalpel: Reduce AI Costs by 200x
Latest Release: v2.1.1 | March 9, 2026
Stop copy-pasting entire files into Claude. Give your AI assistant surgical code analysis tools and reduce costs by 200x.
Result: $450/month → $22/month. Same quality answers, 95% lower cost, 10x faster responses.
Enterprise governance for Code Scalpel is now available via Aegis-OS. Code Scalpel ships as the default MCP toolkit inside Aegis-OS — one
docker-compose upgives you a fully governed, policy-enforced agent environment.git clone https://github.com/tescolopio/aegis-os && cd aegis-os && docker-compose up # Code Scalpel available at http://localhost:18090/sse
What's New in v2.1.1 — Metadata Sync
This patch release refreshes public packaging metadata so PyPI and Marketplace copy match the current 22-core-tool product framing.
What's New in v2.1.0 — Full Go Support
Code Scalpel now supports 8 languages with production-quality parsers.
[20260306_DOCS] Core parsing, extraction, and analysis surfaces span the full language set. Graph-oriented MCP tools such as
get_call_graph,get_graph_neighborhood, andget_cross_file_dependenciesremain Python-first today, with an initial JavaScript/TypeScript function-node parity slice now available inget_call_graphandget_graph_neighborhood, plus partial awareness in some shared JS/TS/Java paths.
| Language | Extensions | Highlights |
|---|---|---|
| Python | .py | Full AST + PDG + symbolic execution |
| JavaScript | .js, .jsx | AST, extraction, partial graph/dependency awareness |
| TypeScript | .ts, .tsx | Full type analysis, React components |
| Java | .java | AST parsing and analysis |
| Go (new in v2.1) | .go | Functions, methods, structs, interfaces, imports, goroutines |
| C (new in v2.0) | .c, .h | Functions, structs, unions, enums, macros, bitfields |
| C++ (new in v2.0) | .cpp, .hpp, .cc, and more | Classes, templates, namespaces, operator overloading |
| C# (new in v2.0) | .cs | Classes, records, interfaces, generics, async/await |
285 new language tests added (v2.0: 262; v2.1: +23 Go tests). Zero breaking changes to existing APIs. See CHANGELOG for full details.
Standalone By Default, Enterprise-Compatible By Design
Code Scalpel delivers first-party parsing and analysis out of the box. Core value does not depend on licensed third-party scanners or external platforms.
- Standalone core: syntax parsing, structural analysis, IR normalization, taint analysis, symbolic execution, and baseline security findings work as native Code Scalpel capabilities.
- Open-tool support: license-free local CLI tools can be executed directly when practical.
- Enterprise adapters: tools like Coverity, SonarQube, ReSharper, Exakat, and similar platforms can be ingested through exported JSON, XML, SARIF, or API payloads and normalized into one internal analysis model.
- No hard dependency boundary: third-party scanners can extend enterprise workflows, but they are not required for basic product value.
This gives teams the right split:
- Standalone enough to work immediately in local and self-managed environments.
- Enterprise-friendly enough to plug into existing AppSec, compliance, and governance stacks.
- Architecturally honest about what Code Scalpel analyzes natively versus what it federates from external systems.
In short: Code Scalpel is standalone by default, enterprise-compatible by design.
What Is Code Scalpel? (30-Second Version)
Code Scalpel is an MCP (Model Context Protocol) server that gives AI assistants like Claude, GitHub Copilot, and Cursor the ability to surgically extract and analyze code instead of reading entire files.
Before Code Scalpel ❌
# You paste entire 500-line file into Claude
# Tokens: 10,247 tokens
# Cost: $0.030 per query
# Time: 12 seconds
# Claude has to read everything, even irrelevant code
After Code Scalpel ✅
# Ask: "Use Code Scalpel to extract calculate_tax function"
# Claude uses extract_code tool automatically
# Tokens: 287 tokens (just the function you need)
# Cost: $0.0009 per query
# Time: 2 seconds
Savings: 97% cost reduction, 83% time reduction, zero workflow changes.
The Bridge: Stochastic AI → Reliable Engineering
Code Scalpel is the bridge between stochastic AI (LLMs that guess) and reliable software engineering (deterministic systems that know).
Your AI assistant is a probability engine. It generates the most likely answer based on patterns in training data. That works brilliantly for prose and boilerplate. It breaks down when precision is non-negotiable — refactoring a production service, tracing a SQL injection through four files, or proving that a rename touched every caller.
Code Scalpel wraps your stochastic agent in a deterministic glass box: every code operation backed by a real AST parse, a real call graph, a real theorem prover. The agent still generates; Code Scalpel verifies, executes, and logs.
Stochastic LLM → Code Scalpel → Deterministic Code Operations
(guesses) (glass box) (verified facts)
The Four Pillars
1. 💸 Cheaper AI — 99% Context Reduction
Instead of feeding 10 full files (15,000 tokens) to the model, Code Scalpel's PDG engine surgically extracts only the relevant function and its live dependencies.
| Approach | Tokens Used | Cost (Claude Sonnet) |
|---|---|---|
| Read entire file | ~10,000 | $0.030 per query |
extract_code("calculate_tax") | ~200 | $0.0006 per query |
Result: $450/month → $22/month doing the same work. You save money and the model focuses better because it isn't drowning in irrelevant context.
2. 🎯 More Accurate AI — Graph Facts, Not LLM Guesses
When Code Scalpel reports "this function has 3 callers", that is a graph fact derived from AST parsing — not an LLM estimate.
| Analysis | Text-Matching Agent | Code Scalpel (AST + PDG) |
|---|---|---|
| Simple rename | ~73% correct | 97% correct |
| Cross-file refactor | ~41% correct | 94% correct |
| Security-aware edit | ~28% correct | 91% correct |
Symbolic execution with the Z3 theorem prover mathematically explores every code path — finding edge cases that humans and LLMs both miss. When symbolic_execute says a path is safe, it is provably safe.
3. 🛡️ Safer AI — The Syntax-Aware Gatekeeper
Every AI-generated edit passes through Code Scalpel's AST parser before it touches disk.
Without Code Scalpel: Agent hallucinates a missing
)→ file written → build breaks → you find out later.With Code Scalpel: AST parser fails on the malformed output → edit rejected and logged → agent retries with corrected code.
The simulate_refactor tool runs a behavioral diff before any change is applied. If the semantics change unexpectedly, the operation is blocked.
4. 🏛️ Governable AI — The Invisible Audit Trail
Compliance isn't optional in regulated environments. Code Scalpel creates a .code-scalpel/audit.jsonl trail for every agent operation.
- Provenance: We log the decision path (graph trace), not just the diff output.
- Integrity:
verify_policy_integritycryptographically ensures your governance rules haven't drifted. - Explainability: When a regulator asks "why did the agent make that change?", you have a deterministic, reproducible answer — not "the model seemed confident".
New? Start Here 👋
Never used Code Scalpel? Get started in 3 steps:
- 📖 What is this? — Understand Code Scalpel in 10 seconds with visual examples
- ⚡ 2-Minute Setup — Install and configure Claude Desktop in under 2 minutes
- Ask your AI assistant — "Use Code Scalpel to extract [function_name] from [file.py]"
That's it. You'll see 200x token reduction on your first query.
Who Is This For?
Code Scalpel serves 4 primary user types:
👤 Individual Developers (Cost Reduction Focus)
You're spending $50-450/month on Claude API and want to cut costs 95%.
- ✅ Real example: $450/mo → $22/mo
- ✅ 2-minute installation, zero maintenance
- ✅ Works with Claude Desktop, GitHub Copilot, Cursor
👥 Team Leads (Team ROI Focus)
You manage 8-15 developers and need to reduce team AI costs 40%+.
- ✅ Real example: $3,000/mo → $1,800/mo = $14,400/year saved
- ✅ 1-hour team rollout with templates and playbooks
- ✅ Usage analytics and ROI tracking included
🛡️ Security Engineers (AppSec Evaluation Focus)
You need OWASP Top 10 coverage with <10% false positive rate.
- ✅ Taint-based security analysis (SQL injection, XSS, command injection, SSRF)
- ✅ <10% false positive rate (measured across 2,000+ repos)
- ✅ OWASP Top 10 2021 mapped with CWE examples
- ✅ Cross-file vulnerability tracking
🏢 Enterprise Architects (Compliance & Scale Focus)
You need SOC2/ISO compliance and 500-2000+ user deployment.
- ✅ On-premise deployment option (air-gapped environments)
- ✅ Enterprise SSO/LDAP integration
- ✅ Cryptographic policy verification
- ✅ Runs locally (no code sent to cloud)
Quick Installation
For Claude Desktop / VSCode / Cursor Users
uvx codescalpel mcp
Then follow the Installation Guide for Claude to integrate with your AI assistant.
Or see all Installation Options below.
Quick Start (3 Steps)
New to Code Scalpel? Start here:
- 📖 Installation Guide for Claude — Complete setup guide for Claude Desktop, VSCode, and Cursor with step-by-step instructions.
- ✅ License Setup — Configure your license and get up and running in 5 minutes.
- Start asking your AI assistant — Ask Claude, Copilot, or Cursor to help you with your code.
Maintainers? See Release Guide for publishing to PyPI, GitHub, and VS Code Marketplace.
Developers? See Installation Options and Docs below.
The Problem: Why AI Agents Need Code Scalpel
Most teams are on Day 1 of agentic engineering: "Look, it writes code!" Day 3 is coming — and Day 3 is about Governance, Security, and Compliance.
Today's agents treat code as text. They read files like a novel, guess line numbers, and vibe-code their way through refactors. In a serious engineering or regulated environment, this creates three compounding risks:
- The Black Box Risk — A regulator or incident review asks why the agent made a decision. You can't explain it because it was a probabilistic guess, not a logged, traceable operation.
- The Hallucination Risk — The agent invents a closing
), a missing import, or a non-existent dependency. The build breaks silently or — worse — ships. - The Blind Spot Risk — The agent generates a SQL injection vulnerability because it cannot see data flow across file boundaries. Pattern matching misses what taint analysis finds.
Code Scalpel is the adult in the room. It replaces the guesswork with deterministic, auditable, graph-based operations.
1. 💸 Massive Token Waste (95% of tokens are irrelevant)
You ask: "Explain the calculate_tax function."
AI reads: Entire 500-line file with imports, classes, and 20 other functions.
Result: 10,000 tokens to answer a 50-token question.
2. ⏱️ Slow Response Times (10-15 second waits)
Processing large files takes time. Every query involving code:
- Sends entire file content (network latency)
- AI processes everything (compute delay)
- Generates response from full context
Result: 10-15 seconds per query instead of 1-2 seconds.
3. 🔴 Context Limit Errors (Can't analyze large codebases)
Claude's 200K token limit sounds big until you hit it:
- 5 medium files = 50,000 tokens
- 10 medium files = 100,000 tokens
- 20 medium files = LIMIT EXCEEDED
Result: Can't analyze anything beyond small projects.
4. 🐛 Hallucination & Errors ("Replace line 50" breaks when file changes)
AI generates: "Replace lines 45-50 with..."
You apply the change. File had 48 lines. Now your code is broken.
Result: Fragile, error-prone modifications.
The Solution: Surgical Tools, Not Text Parsing
Code Scalpel gives AI agents 22 core tools to interact with code as structured data (AST + PDG), not text, plus a separate capability-introspection surface for tier/license discovery:
| Problem | Without Code Scalpel | With Code Scalpel |
|---|---|---|
| Find a function | Read entire file (10,000 tokens) | extract_code("calculate_tax") (287 tokens) |
| Find dependencies | Read 5+ files manually (50,000 tokens) | get_cross_file_dependencies("Order") (892 tokens) |
| Security scan | Guess patterns (70% false positives) | security_scan() with taint analysis (<10% FP) |
| Refactor safely | Hope for the best | simulate_refactor() verifies behavior |
| Find usage | Search all files (100,000 tokens) | get_symbol_references("MyClass") (1,234 tokens) |
Key Principle: AI agents use deterministic tools instead of text guessing.
Security Features (AppSec Teams)
OWASP Top 10 Coverage
✅ A03:2021 - Injection (Full Coverage)
- SQL Injection (CWE-89)
- XSS (CWE-79)
- Command Injection (CWE-78)
- Path Traversal (CWE-22)
- NoSQL Injection (CWE-943)
- LDAP Injection (CWE-90)
✅ A06:2021 - Vulnerable Components (Full Coverage)
- CVE detection via OSV API
- Real-time vulnerability database
- Transitive dependency scanning
✅ A10:2021 - SSRF (Full Coverage)
- Server-Side Request Forgery detection
- URL validation tracking
✅ A08:2021 - Software Integrity (Full Coverage)
- Insecure deserialization detection
- Cryptographic policy verification
False Positive Rate: <10%
Measured across 2,000+ open-source repositories
| Tool | False Positive Rate | Detection Rate |
|---|---|---|
| Code Scalpel | 9.8% | 89.8% |
| Semgrep | 22.4% | 86.2% |
| Bandit | 31.7% | 82.3% |
| CodeQL | 15.8% | 92.1% |
Cross-File Taint Analysis
Tracks tainted data across module boundaries:
# routes.py
user_input = request.args.get('query') # TAINT SOURCE
execute_search(user_input) # Flows to database.py
# database.py
def execute_search(query):
cursor.execute(f"SELECT * FROM items WHERE name='{query}'") # SINK ❌
Code Scalpel detects this cross-file SQL injection.
22 Core Tools (All Free in Community Edition)
Code Scalpel provides 20 development tools + 2 core system tools = 22 core tools.
All 22 core tools are available in free Community Edition. Pro/Enterprise tiers add enhanced limits and team features.
Agent clients can also call get_capabilities to inspect the current tier/license limits. We treat that as capability introspection rather than part of the 22-core-tool product count.
1. Surgical Extraction & Analysis (6 Tools)
Stop grepping. Start understanding.
extract_code: Surgically extract functions/classes by name, including necessary imports.analyze_code: Parse structure, complexity, imports, and definitions.get_project_map: Instant high-level cognitive map of the project structure.get_call_graph: Trace Python-first execution flow, with initial local JS/TS parity.get_symbol_references: Find all usages of a symbol across the project.get_file_context: Get surrounding context and metadata for any code location.
2. Taint-Based Security (6 Tools)
Real security analysis, not just regex matching.
security_scan: Trace data flow from user input to dangerous sinks (12+ CWEs).unified_sink_detect: Polyglot detection of dangerous functions (sinks).cross_file_security_scan: Track dirty data even when it passes through multiple modules.scan_dependencies: Check package dependencies for known vulnerabilities (CVEs).type_evaporation_scan: Detect TypeScript type system vulnerabilities at I/O boundaries.get_graph_neighborhood: Extract Python-first k-hop security context, with initial local JS/TS function parity and JS/TS method neighborhoods when advanced resolution is available.
3. Safe Modification (4 Tools)
update_symbol: Atomic replacement of code blocks with safety checks.rename_symbol: Project-wide refactoring that updates all references consistently.simulate_refactor: "Dry run" tool that verifies changes before application (safety/build).validate_paths: Pre-flight path validation for file operations (Docker-aware).
4. Verification & Testing (3 Tools)
Trust, but verify.
symbolic_execute: Uses the Z3 theorem prover to mentally explore code paths.generate_unit_tests: Auto-creates mathematical proof-of-correctness tests from execution paths.crawl_project: Project-wide analysis of code structure and metrics.
5. Advanced Analysis (1 Tool)
get_cross_file_dependencies: Analyze Python-first dependency chains across files.
6. System & Infrastructure (2 Tools)
Infrastructure and governance tools for agent orchestration and policy enforcement.
code_policy_check: Evaluate code against organizational compliance standards and security policies.verify_policy_integrity: Verify policy file integrity using cryptographic signatures.
How We're Different
Code Scalpel vs Python scalpel Library
Code Scalpel is NOT a fork or wrapper of the scalpel Python library. It's a completely independent, production-grade MCP server:
| Feature | Code Scalpel | Python scalpel |
|---|---|---|
| Interface | MCP server (primary) | CLI tool only |
| AI Agent Ready | Yes (designed for agents) | CLI-only |
| Tools | 20 development + 3 system tools | Limited utilities |
| Security Scanning | Taint analysis (12 CWEs) | Basic pattern matching |
| Symbolic Execution | Z3-powered (all paths) | Not supported |
| Test Generation | Auto-generate from paths | Not supported |
| Refactor Verification | Behavior preservation check | Manual verification |
| Cross-file Analysis | Full dependency tracking | Limited scope |
| Licensing | Community (MIT) + Pro/Enterprise | N/A |
Code Scalpel vs Other Code Analysis Tools
| Feature | Code Scalpel | AST Explorer | Semgrep | Pylint |
|---|---|---|---|---|
| Primary Use | MCP server for AI agents | Code visualization | Security patterns | Style linting |
| Tool Count | 20 dev + 3 system tools | Query only | ~1000 rules | Limited |
| Code Extraction | ✅ By symbol name, safe | ⚠️ Manual AST inspection | ❌ Not primary | ❌ Not supported |
| Security Scan | ✅ Full taint analysis (12 CWEs) | ❌ No | ⚠️ Pattern-based | ⚠️ Basic only |
| Symbolic Execution | ✅ Z3-powered | ❌ No | ❌ No | ❌ No |
| Test Generation | ✅ Auto-generate from paths | ❌ No | ❌ No | ❌ No |
| Safe Refactoring | ✅ Behavior verification | ❌ Manual | ❌ Not supported | ❌ Not supported |
| Cross-file Deps | ✅ Full tracking | ⚠️ Limited | ⚠️ Limited | ⚠️ Limited |
| MCP Server | ✅ Primary interface | ❌ No | ❌ No | ❌ No |
| LLM-Friendly | ✅ Designed for agents | ⚠️ Limited | ⚠️ Limited | ⚠️ Limited |
| Polyglot | ✅ Python, JS, TS, Java, C, C++, C# | ✅ Multi-language | ✅ Multi-language | ⚠️ Python-only |
Code Scalpel vs IDE Extensions
| Feature | Code Scalpel | VS Code Pylance | JetBrains IDEs | Copilot |
|---|---|---|---|---|
| Interface | MCP server | IDE plugin | IDE plugin | Chat-only |
| Surgical Extraction | ✅ By name, safe, cross-file | ⚠️ Partial (line-based) | ⚠️ Partial (line-based) | ❌ Not precise |
| Security Analysis | ✅ 20 dev tools, taint-based | ⚠️ Limited | ⚠️ Limited | ⚠️ Generalist |
| Test Generation | ✅ Symbolic execution | ❌ No | ❌ No | ⚠️ Quality varies |
| Behavior Verification | ✅ Before refactoring | ❌ No | ⚠️ Limited | ⚠️ Manual only |
| Independent of IDE | ✅ Works anywhere | ❌ IDE-bound | ❌ IDE-bound | ❌ Web-bound |
| Offline Capable | ✅ Yes | ✅ Yes | ✅ Yes | ❌ No |
| Reproducible | ✅ Deterministic | ✅ Deterministic | ✅ Deterministic | ⚠️ Variable |
Installation Options
🚀 Recommended: Claude Code / Claude Desktop (stdio transport)
One-liner installation:
claude mcp add codescalpel uvx codescalpel mcp
Why this method?
- ✅ Simplest setup (one command)
- ✅ Automatic updates via PyPI
- ✅ Works offline after initial download
- ✅ No infrastructure required
- ✅ Zero configuration
Requirements:
- Python 3.10+ installed
uvxinstalled (comes with Python viapip install uv)- Claude Code or Claude Desktop
What happens:
- Claude runs
uvx codescalpel mcpwhen you ask for code analysis - All 22 core tools become available in your AI assistant, with capability introspection available separately for tier/license discovery
- Your code is analyzed locally; no data sent to external servers
If you have a Pro or Enterprise license, you need to configure Code Scalpel to use your license file.
Method 1: Standard Location (Recommended)
Place your license file in the standard location:
mkdir -p .code-scalpel/license
cp /path/to/your/license.jwt .code-scalpel/license/license.jwt
Then use the standard installation command:
claude mcp add codescalpel uvx codescalpel mcp
Code Scalpel will automatically discover your license.
Standard license locations checked (in order):
.code-scalpel/license/license.jwt(preferred).code-scalpel/license.jwt~/.config/code-scalpel/license.jwt(user-wide)~/.code-scalpel/license.jwt(legacy)
Method 2: Environment Variable
Set the license path in your environment:
export CODE_SCALPEL_LICENSE_PATH=/path/to/license.jwt
claude mcp add codescalpel uvx codescalpel mcp
Method 3: Manual Configuration
Edit your claude_desktop_config.json manually:
{
"mcpServers": {
"codescalpel": {
"command": "uvx",
"args": ["codescalpel", "mcp"],
"env": {
"CODE_SCALPEL_LICENSE_PATH": "/path/to/license.jwt"
}
}
}
}
Verify Your License
Check that your license is recognized:
uvx codescalpel tier-info
Expected output for Pro/Enterprise:
Current Tier: pro (or enterprise)
License Status: Valid
Expires: 2025-12-31
Alternative: Manual Configuration
If you prefer to edit configuration files manually:
Claude Desktop (macOS/Windows/Linux):
Edit ~/.claude/claude_desktop_config.json and add:
{
"mcpServers": {
"codescalpel": {
"command": "uvx",
"args": ["codescalpel", "mcp"]
}
}
}
VS Code / Cursor:
Edit .vscode/mcp.json in your workspace:
{
"mcpServers": {
"codescalpel": {
"command": "uvx",
"args": ["codescalpel", "mcp"]
}
}
}
Network Deployments: HTTP Transports
For remote teams, Docker, Kubernetes, or network deployments, Code Scalpel supports two HTTP-based transports:
SSE (Server-Sent Events) - Best for remote teams and Docker:
codescalpel mcp --transport sse --host 0.0.0.0 --port 8080
streamable-http - Best for production systems and load balancers:
codescalpel mcp --transport streamable-http --host 0.0.0.0 --port 8080
With HTTPS for production:
codescalpel mcp --transport sse --ssl-cert cert.pem --ssl-key key.pem
Client configuration (SSE):
{
"mcpServers": {
"code-scalpel": {
"url": "http://localhost:8080/sse",
"transport": "sse"
}
}
}
Client configuration (streamable-http):
{
"mcpServers": {
"code-scalpel": {
"url": "http://localhost:8080/mcp",
"transport": "http"
}
}
}
See the MCP Transports Guide for comprehensive setup instructions, security configuration, and deployment examples.
Troubleshooting
"Command not found: uvx"?
pip install uv
MCP server not showing up in Claude?
- Restart Claude Code or Claude Desktop
- Check that
uvx codescalpelworks in your terminal:uvx codescalpel --version - If still not working, try manual configuration (see above)
Debug mode: Enable verbose logging:
export SCALPEL_MCP_OUTPUT=DEBUG
claude mcp add codescalpel uvx codescalpel mcp
Debug license validation:
export SCALPEL_MCP_OUTPUT=DEBUG
export CODE_SCALPEL_LICENSE_PATH=/path/to/license.jwt # If needed
claude mcp add codescalpel uvx codescalpel mcp
CLI Usage
All 22 MCP tools are now available directly from the command line!
In addition to the MCP server interface, Code Scalpel provides dedicated CLI commands for every tool. This is perfect for:
- Scripts and automation - Integrate into CI/CD pipelines
- Manual analysis - Quick command-line access without an MCP client
- Shell workflows - Pipe JSON output between tools
Quick Start
# Install Code Scalpel
pip install codescalpel
# View all available commands
codescalpel --help
# Get help for any specific command
codescalpel extract-code --help
Common CLI Commands
| Command | Description | Example |
|---|---|---|
codescalpel extract-code | Extract functions/classes with dependencies | codescalpel extract-code src/api.py --function handler |
codescalpel analyze | Perform AST and static analysis | codescalpel analyze src/main.py --json |
codescalpel scan | Security vulnerability detection | codescalpel scan src/ |
codescalpel get-call-graph | Generate function call graphs | codescalpel get-call-graph src/app.py |
codescalpel get-file-context | Get file structure overview | codescalpel get-file-context src/models.py |
codescalpel get-symbol-references | Find all symbol usages | codescalpel get-symbol-references MyClass |
codescalpel rename-symbol | Safe symbol renaming | codescalpel rename-symbol src/api.py old_name new_name |
codescalpel generate-unit-tests | AI-powered test generation | codescalpel generate-unit-tests src/utils.py |
codescalpel cross-file-security-scan | Cross-file taint analysis | codescalpel cross-file-security-scan |
codescalpel validate-paths | Validate import paths | codescalpel validate-paths src/main.py |
See all 22 commands: Complete CLI Tools Reference →
Example Workflows
Extract and Analyze a Function
# Extract function with dependencies
codescalpel extract-code src/api.py --function process_payment --include-deps > extracted.py
# Analyze the extracted code
codescalpel analyze extracted.py --json
# Generate comprehensive tests
codescalpel generate-unit-tests extracted.py
Security Audit Pipeline
# Run basic security scan
codescalpel scan src/
# Deep cross-file taint analysis
codescalpel cross-file-security-scan --max-depth 10
# Check policy compliance
codescalpel code-policy-check src/ --strict
Refactoring with Impact Analysis
# Get current call graph
codescalpel get-call-graph src/auth.py
# Find all references
codescalpel get-symbol-references UserAuthentication
# Simulate refactor
codescalpel simulate-refactor src/auth.py --changes "rename UserAuthentication to AuthService"
# Perform rename
codescalpel rename-symbol src/auth.py UserAuthentication AuthService
JSON Output for Automation
All commands support --json flag for machine-readable output:
# Get JSON output
codescalpel analyze src/main.py --json | jq '.functions[] | .name'
# Pipe between commands
codescalpel crawl-project --json | jq '.high_complexity_files[]' | \
xargs -I {} codescalpel analyze {} --json
Tier System
All CLI tools respect the same three-tier licensing system as the MCP server:
- Community (Free): All tools available with basic limits
- Pro: Enhanced limits, cross-file analysis, parallel processing
- Enterprise: Unlimited thresholds, advanced features
Check your current tier and limits:
codescalpel capabilities
For complete CLI documentation, see CLI Tools Reference.
Release Information
Launch Date: January 2026 Version: v2.1.1 License: MIT (Community)
Code Scalpel is built for the new era of Agentic Engineering. It is not just a linter; it is the sensory and actuator system for the next generation of AI developers.
Documentation
- Getting Started - Detailed setup guide
- Configuration Guide - All configuration options
- API Reference - Complete tool documentation
- Security Analysis - How vulnerability detection works
Community
Have questions? Open an issue or start a discussion.
Related Servers
Scout Monitoring MCP
sponsorPut performance and error data directly in the hands of your AI assistant.
Alpha Vantage MCP Server
sponsorAccess financial market data: realtime & historical stock, ETF, options, forex, crypto, commodities, fundamentals, technical indicators, & more
SSH Rails Runner
Execute Rails console commands remotely and securely over SSH.
MCP-Compose
Orchestration tool for managing multiple MCP servers with a Docker Compose-style interface and a unified HTTP proxy.
ConfigCat
interacts with ConfigCat feature flag platform. Supports managing feature flags, configs, environments, products and organizations. Helps to integrate ConfigCat SDK, implement feature flags or remove zombie (stale) flags.
refactor-mcp
Refactor code using regex-based search and replace.
SQLFluff Analyzer
Analyze, lint, and fix SQL queries using the SQLFluff linter.
Rongda MCP Server
An MCP server for Rongda that supports authentication through environment variables.
Figma Context MCP
Provides Figma layout information to AI coding agents like Cursor.
Symphony of One
An MCP server for orchestrating multiple Claude instances to collaborate in a shared workspace with real-time communication.
VideoDB
Server for advanced AI-driven video editing, semantic search, multilingual transcription, generative media, voice cloning, and content moderation.
Deliberate Reasoning Engine (DRE)
Transforms linear AI reasoning into structured, auditable thought graphs, enabling language models to externalize their reasoning process as a directed acyclic graph (DAG).