Code Scalpel

Code Scalpel is an MCP server that upgrades your AI coding agent with surgical, graph-based tools for precise analysis, atomic refactoring, and 99% lower token costs.

Code Scalpel: Reduce AI Costs by 200x

Latest Release: v2.1.1 | March 9, 2026

Stop copy-pasting entire files into Claude. Give your AI assistant surgical code analysis tools and reduce costs by 200x.

Result: $450/month → $22/month. Same quality answers, 95% lower cost, 10x faster responses.

Free Forever Setup Time Local Execution Core Tools Languages Governed by Aegis-OS GitHub release

Enterprise governance for Code Scalpel is now available via Aegis-OS. Code Scalpel ships as the default MCP toolkit inside Aegis-OS — one docker-compose up gives you a fully governed, policy-enforced agent environment.

git clone https://github.com/tescolopio/aegis-os && cd aegis-os && docker-compose up
# Code Scalpel available at http://localhost:18090/sse

What's New in v2.1.1 — Metadata Sync

This patch release refreshes public packaging metadata so PyPI and Marketplace copy match the current 22-core-tool product framing.

What's New in v2.1.0 — Full Go Support

Code Scalpel now supports 8 languages with production-quality parsers.

[20260306_DOCS] Core parsing, extraction, and analysis surfaces span the full language set. Graph-oriented MCP tools such as get_call_graph, get_graph_neighborhood, and get_cross_file_dependencies remain Python-first today, with an initial JavaScript/TypeScript function-node parity slice now available in get_call_graph and get_graph_neighborhood, plus partial awareness in some shared JS/TS/Java paths.

LanguageExtensionsHighlights
Python.pyFull AST + PDG + symbolic execution
JavaScript.js, .jsxAST, extraction, partial graph/dependency awareness
TypeScript.ts, .tsxFull type analysis, React components
Java.javaAST parsing and analysis
Go (new in v2.1).goFunctions, methods, structs, interfaces, imports, goroutines
C (new in v2.0).c, .hFunctions, structs, unions, enums, macros, bitfields
C++ (new in v2.0).cpp, .hpp, .cc, and moreClasses, templates, namespaces, operator overloading
C# (new in v2.0).csClasses, records, interfaces, generics, async/await

285 new language tests added (v2.0: 262; v2.1: +23 Go tests). Zero breaking changes to existing APIs. See CHANGELOG for full details.


Standalone By Default, Enterprise-Compatible By Design

Code Scalpel delivers first-party parsing and analysis out of the box. Core value does not depend on licensed third-party scanners or external platforms.

  • Standalone core: syntax parsing, structural analysis, IR normalization, taint analysis, symbolic execution, and baseline security findings work as native Code Scalpel capabilities.
  • Open-tool support: license-free local CLI tools can be executed directly when practical.
  • Enterprise adapters: tools like Coverity, SonarQube, ReSharper, Exakat, and similar platforms can be ingested through exported JSON, XML, SARIF, or API payloads and normalized into one internal analysis model.
  • No hard dependency boundary: third-party scanners can extend enterprise workflows, but they are not required for basic product value.

This gives teams the right split:

  • Standalone enough to work immediately in local and self-managed environments.
  • Enterprise-friendly enough to plug into existing AppSec, compliance, and governance stacks.
  • Architecturally honest about what Code Scalpel analyzes natively versus what it federates from external systems.

In short: Code Scalpel is standalone by default, enterprise-compatible by design.


What Is Code Scalpel? (30-Second Version)

Code Scalpel is an MCP (Model Context Protocol) server that gives AI assistants like Claude, GitHub Copilot, and Cursor the ability to surgically extract and analyze code instead of reading entire files.

Before Code Scalpel ❌

# You paste entire 500-line file into Claude
# Tokens: 10,247 tokens
# Cost: $0.030 per query
# Time: 12 seconds
# Claude has to read everything, even irrelevant code

After Code Scalpel ✅

# Ask: "Use Code Scalpel to extract calculate_tax function"
# Claude uses extract_code tool automatically
# Tokens: 287 tokens (just the function you need)
# Cost: $0.0009 per query  
# Time: 2 seconds

Savings: 97% cost reduction, 83% time reduction, zero workflow changes.


The Bridge: Stochastic AI → Reliable Engineering

Code Scalpel is the bridge between stochastic AI (LLMs that guess) and reliable software engineering (deterministic systems that know).

Your AI assistant is a probability engine. It generates the most likely answer based on patterns in training data. That works brilliantly for prose and boilerplate. It breaks down when precision is non-negotiable — refactoring a production service, tracing a SQL injection through four files, or proving that a rename touched every caller.

Code Scalpel wraps your stochastic agent in a deterministic glass box: every code operation backed by a real AST parse, a real call graph, a real theorem prover. The agent still generates; Code Scalpel verifies, executes, and logs.

Stochastic LLM  →  Code Scalpel  →  Deterministic Code Operations
  (guesses)           (glass box)          (verified facts)

The Four Pillars

1. 💸 Cheaper AI — 99% Context Reduction

Instead of feeding 10 full files (15,000 tokens) to the model, Code Scalpel's PDG engine surgically extracts only the relevant function and its live dependencies.

ApproachTokens UsedCost (Claude Sonnet)
Read entire file~10,000$0.030 per query
extract_code("calculate_tax")~200$0.0006 per query

Result: $450/month → $22/month doing the same work. You save money and the model focuses better because it isn't drowning in irrelevant context.

2. 🎯 More Accurate AI — Graph Facts, Not LLM Guesses

When Code Scalpel reports "this function has 3 callers", that is a graph fact derived from AST parsing — not an LLM estimate.

AnalysisText-Matching AgentCode Scalpel (AST + PDG)
Simple rename~73% correct97% correct
Cross-file refactor~41% correct94% correct
Security-aware edit~28% correct91% correct

Symbolic execution with the Z3 theorem prover mathematically explores every code path — finding edge cases that humans and LLMs both miss. When symbolic_execute says a path is safe, it is provably safe.

3. 🛡️ Safer AI — The Syntax-Aware Gatekeeper

Every AI-generated edit passes through Code Scalpel's AST parser before it touches disk.

Without Code Scalpel: Agent hallucinates a missing ) → file written → build breaks → you find out later.

With Code Scalpel: AST parser fails on the malformed output → edit rejected and logged → agent retries with corrected code.

The simulate_refactor tool runs a behavioral diff before any change is applied. If the semantics change unexpectedly, the operation is blocked.

4. 🏛️ Governable AI — The Invisible Audit Trail

Compliance isn't optional in regulated environments. Code Scalpel creates a .code-scalpel/audit.jsonl trail for every agent operation.

  • Provenance: We log the decision path (graph trace), not just the diff output.
  • Integrity: verify_policy_integrity cryptographically ensures your governance rules haven't drifted.
  • Explainability: When a regulator asks "why did the agent make that change?", you have a deterministic, reproducible answer — not "the model seemed confident".

New? Start Here 👋

Never used Code Scalpel? Get started in 3 steps:

  1. 📖 What is this? — Understand Code Scalpel in 10 seconds with visual examples
  2. ⚡ 2-Minute Setup — Install and configure Claude Desktop in under 2 minutes
  3. Ask your AI assistant — "Use Code Scalpel to extract [function_name] from [file.py]"

That's it. You'll see 200x token reduction on your first query.


Who Is This For?

Code Scalpel serves 4 primary user types:

👤 Individual Developers (Cost Reduction Focus)

You're spending $50-450/month on Claude API and want to cut costs 95%.

  • ✅ Real example: $450/mo → $22/mo
  • ✅ 2-minute installation, zero maintenance
  • ✅ Works with Claude Desktop, GitHub Copilot, Cursor

Cost Optimization Guide

👥 Team Leads (Team ROI Focus)

You manage 8-15 developers and need to reduce team AI costs 40%+.

  • ✅ Real example: $3,000/mo → $1,800/mo = $14,400/year saved
  • ✅ 1-hour team rollout with templates and playbooks
  • ✅ Usage analytics and ROI tracking included

Team Quickstart Guide

🛡️ Security Engineers (AppSec Evaluation Focus)

You need OWASP Top 10 coverage with <10% false positive rate.

  • ✅ Taint-based security analysis (SQL injection, XSS, command injection, SSRF)
  • <10% false positive rate (measured across 2,000+ repos)
  • ✅ OWASP Top 10 2021 mapped with CWE examples
  • ✅ Cross-file vulnerability tracking

OWASP Top 10 Coverage

🏢 Enterprise Architects (Compliance & Scale Focus)

You need SOC2/ISO compliance and 500-2000+ user deployment.

  • ✅ On-premise deployment option (air-gapped environments)
  • ✅ Enterprise SSO/LDAP integration
  • ✅ Cryptographic policy verification
  • ✅ Runs locally (no code sent to cloud)

Enterprise Guide


Quick Installation

For Claude Desktop / VSCode / Cursor Users

uvx codescalpel mcp

Then follow the Installation Guide for Claude to integrate with your AI assistant.

Or see all Installation Options below.


Quick Start (3 Steps)

New to Code Scalpel? Start here:

  1. 📖 Installation Guide for Claude — Complete setup guide for Claude Desktop, VSCode, and Cursor with step-by-step instructions.
  2. ✅ License Setup — Configure your license and get up and running in 5 minutes.
  3. Start asking your AI assistant — Ask Claude, Copilot, or Cursor to help you with your code.

Maintainers? See Release Guide for publishing to PyPI, GitHub, and VS Code Marketplace.

Developers? See Installation Options and Docs below.

The Problem: Why AI Agents Need Code Scalpel

Most teams are on Day 1 of agentic engineering: "Look, it writes code!" Day 3 is coming — and Day 3 is about Governance, Security, and Compliance.

Today's agents treat code as text. They read files like a novel, guess line numbers, and vibe-code their way through refactors. In a serious engineering or regulated environment, this creates three compounding risks:

  • The Black Box Risk — A regulator or incident review asks why the agent made a decision. You can't explain it because it was a probabilistic guess, not a logged, traceable operation.
  • The Hallucination Risk — The agent invents a closing ), a missing import, or a non-existent dependency. The build breaks silently or — worse — ships.
  • The Blind Spot Risk — The agent generates a SQL injection vulnerability because it cannot see data flow across file boundaries. Pattern matching misses what taint analysis finds.

Code Scalpel is the adult in the room. It replaces the guesswork with deterministic, auditable, graph-based operations.

1. 💸 Massive Token Waste (95% of tokens are irrelevant)

You ask: "Explain the calculate_tax function."

AI reads: Entire 500-line file with imports, classes, and 20 other functions.

Result: 10,000 tokens to answer a 50-token question.

2. ⏱️ Slow Response Times (10-15 second waits)

Processing large files takes time. Every query involving code:

  • Sends entire file content (network latency)
  • AI processes everything (compute delay)
  • Generates response from full context

Result: 10-15 seconds per query instead of 1-2 seconds.

3. 🔴 Context Limit Errors (Can't analyze large codebases)

Claude's 200K token limit sounds big until you hit it:

  • 5 medium files = 50,000 tokens
  • 10 medium files = 100,000 tokens
  • 20 medium files = LIMIT EXCEEDED

Result: Can't analyze anything beyond small projects.

4. 🐛 Hallucination & Errors ("Replace line 50" breaks when file changes)

AI generates: "Replace lines 45-50 with..."

You apply the change. File had 48 lines. Now your code is broken.

Result: Fragile, error-prone modifications.


The Solution: Surgical Tools, Not Text Parsing

Code Scalpel gives AI agents 22 core tools to interact with code as structured data (AST + PDG), not text, plus a separate capability-introspection surface for tier/license discovery:

ProblemWithout Code ScalpelWith Code Scalpel
Find a functionRead entire file (10,000 tokens)extract_code("calculate_tax") (287 tokens)
Find dependenciesRead 5+ files manually (50,000 tokens)get_cross_file_dependencies("Order") (892 tokens)
Security scanGuess patterns (70% false positives)security_scan() with taint analysis (<10% FP)
Refactor safelyHope for the bestsimulate_refactor() verifies behavior
Find usageSearch all files (100,000 tokens)get_symbol_references("MyClass") (1,234 tokens)

Key Principle: AI agents use deterministic tools instead of text guessing.


Security Features (AppSec Teams)

OWASP Top 10 Coverage

A03:2021 - Injection (Full Coverage)

  • SQL Injection (CWE-89)
  • XSS (CWE-79)
  • Command Injection (CWE-78)
  • Path Traversal (CWE-22)
  • NoSQL Injection (CWE-943)
  • LDAP Injection (CWE-90)

A06:2021 - Vulnerable Components (Full Coverage)

  • CVE detection via OSV API
  • Real-time vulnerability database
  • Transitive dependency scanning

A10:2021 - SSRF (Full Coverage)

  • Server-Side Request Forgery detection
  • URL validation tracking

A08:2021 - Software Integrity (Full Coverage)

  • Insecure deserialization detection
  • Cryptographic policy verification

False Positive Rate: <10%

Measured across 2,000+ open-source repositories

ToolFalse Positive RateDetection Rate
Code Scalpel9.8%89.8%
Semgrep22.4%86.2%
Bandit31.7%82.3%
CodeQL15.8%92.1%

Cross-File Taint Analysis

Tracks tainted data across module boundaries:

# routes.py
user_input = request.args.get('query')  # TAINT SOURCE
execute_search(user_input)  # Flows to database.py

# database.py  
def execute_search(query):
    cursor.execute(f"SELECT * FROM items WHERE name='{query}'")  # SINK ❌

Code Scalpel detects this cross-file SQL injection.

Full OWASP Documentation


22 Core Tools (All Free in Community Edition)

Code Scalpel provides 20 development tools + 2 core system tools = 22 core tools.

All 22 core tools are available in free Community Edition. Pro/Enterprise tiers add enhanced limits and team features.

Agent clients can also call get_capabilities to inspect the current tier/license limits. We treat that as capability introspection rather than part of the 22-core-tool product count.

1. Surgical Extraction & Analysis (6 Tools)

Stop grepping. Start understanding.

  • extract_code: Surgically extract functions/classes by name, including necessary imports.
  • analyze_code: Parse structure, complexity, imports, and definitions.
  • get_project_map: Instant high-level cognitive map of the project structure.
  • get_call_graph: Trace Python-first execution flow, with initial local JS/TS parity.
  • get_symbol_references: Find all usages of a symbol across the project.
  • get_file_context: Get surrounding context and metadata for any code location.

2. Taint-Based Security (6 Tools)

Real security analysis, not just regex matching.

  • security_scan: Trace data flow from user input to dangerous sinks (12+ CWEs).
  • unified_sink_detect: Polyglot detection of dangerous functions (sinks).
  • cross_file_security_scan: Track dirty data even when it passes through multiple modules.
  • scan_dependencies: Check package dependencies for known vulnerabilities (CVEs).
  • type_evaporation_scan: Detect TypeScript type system vulnerabilities at I/O boundaries.
  • get_graph_neighborhood: Extract Python-first k-hop security context, with initial local JS/TS function parity and JS/TS method neighborhoods when advanced resolution is available.

3. Safe Modification (4 Tools)

  • update_symbol: Atomic replacement of code blocks with safety checks.
  • rename_symbol: Project-wide refactoring that updates all references consistently.
  • simulate_refactor: "Dry run" tool that verifies changes before application (safety/build).
  • validate_paths: Pre-flight path validation for file operations (Docker-aware).

4. Verification & Testing (3 Tools)

Trust, but verify.

  • symbolic_execute: Uses the Z3 theorem prover to mentally explore code paths.
  • generate_unit_tests: Auto-creates mathematical proof-of-correctness tests from execution paths.
  • crawl_project: Project-wide analysis of code structure and metrics.

5. Advanced Analysis (1 Tool)

  • get_cross_file_dependencies: Analyze Python-first dependency chains across files.

6. System & Infrastructure (2 Tools)

Infrastructure and governance tools for agent orchestration and policy enforcement.

  • code_policy_check: Evaluate code against organizational compliance standards and security policies.
  • verify_policy_integrity: Verify policy file integrity using cryptographic signatures.

How We're Different

Code Scalpel vs Python scalpel Library

Code Scalpel is NOT a fork or wrapper of the scalpel Python library. It's a completely independent, production-grade MCP server:

FeatureCode ScalpelPython scalpel
InterfaceMCP server (primary)CLI tool only
AI Agent ReadyYes (designed for agents)CLI-only
Tools20 development + 3 system toolsLimited utilities
Security ScanningTaint analysis (12 CWEs)Basic pattern matching
Symbolic ExecutionZ3-powered (all paths)Not supported
Test GenerationAuto-generate from pathsNot supported
Refactor VerificationBehavior preservation checkManual verification
Cross-file AnalysisFull dependency trackingLimited scope
LicensingCommunity (MIT) + Pro/EnterpriseN/A

Code Scalpel vs Other Code Analysis Tools

FeatureCode ScalpelAST ExplorerSemgrepPylint
Primary UseMCP server for AI agentsCode visualizationSecurity patternsStyle linting
Tool Count20 dev + 3 system toolsQuery only~1000 rulesLimited
Code Extraction✅ By symbol name, safe⚠️ Manual AST inspection❌ Not primary❌ Not supported
Security Scan✅ Full taint analysis (12 CWEs)❌ No⚠️ Pattern-based⚠️ Basic only
Symbolic Execution✅ Z3-powered❌ No❌ No❌ No
Test Generation✅ Auto-generate from paths❌ No❌ No❌ No
Safe Refactoring✅ Behavior verification❌ Manual❌ Not supported❌ Not supported
Cross-file Deps✅ Full tracking⚠️ Limited⚠️ Limited⚠️ Limited
MCP Server✅ Primary interface❌ No❌ No❌ No
LLM-Friendly✅ Designed for agents⚠️ Limited⚠️ Limited⚠️ Limited
Polyglot✅ Python, JS, TS, Java, C, C++, C#✅ Multi-language✅ Multi-language⚠️ Python-only

Code Scalpel vs IDE Extensions

FeatureCode ScalpelVS Code PylanceJetBrains IDEsCopilot
InterfaceMCP serverIDE pluginIDE pluginChat-only
Surgical Extraction✅ By name, safe, cross-file⚠️ Partial (line-based)⚠️ Partial (line-based)❌ Not precise
Security Analysis✅ 20 dev tools, taint-based⚠️ Limited⚠️ Limited⚠️ Generalist
Test Generation✅ Symbolic execution❌ No❌ No⚠️ Quality varies
Behavior Verification✅ Before refactoring❌ No⚠️ Limited⚠️ Manual only
Independent of IDE✅ Works anywhere❌ IDE-bound❌ IDE-bound❌ Web-bound
Offline Capable✅ Yes✅ Yes✅ Yes❌ No
Reproducible✅ Deterministic✅ Deterministic✅ Deterministic⚠️ Variable

Installation Options

🚀 Recommended: Claude Code / Claude Desktop (stdio transport)

One-liner installation:

claude mcp add codescalpel uvx codescalpel mcp

Why this method?

  • ✅ Simplest setup (one command)
  • ✅ Automatic updates via PyPI
  • ✅ Works offline after initial download
  • ✅ No infrastructure required
  • ✅ Zero configuration

Requirements:

  • Python 3.10+ installed
  • uvx installed (comes with Python via pip install uv)
  • Claude Code or Claude Desktop

What happens:

  1. Claude runs uvx codescalpel mcp when you ask for code analysis
  2. All 22 core tools become available in your AI assistant, with capability introspection available separately for tier/license discovery
  3. Your code is analyzed locally; no data sent to external servers

If you have a Pro or Enterprise license, you need to configure Code Scalpel to use your license file.

Method 1: Standard Location (Recommended)

Place your license file in the standard location:

mkdir -p .code-scalpel/license
cp /path/to/your/license.jwt .code-scalpel/license/license.jwt

Then use the standard installation command:

claude mcp add codescalpel uvx codescalpel mcp

Code Scalpel will automatically discover your license.

Standard license locations checked (in order):

  • .code-scalpel/license/license.jwt (preferred)
  • .code-scalpel/license.jwt
  • ~/.config/code-scalpel/license.jwt (user-wide)
  • ~/.code-scalpel/license.jwt (legacy)

Method 2: Environment Variable

Set the license path in your environment:

export CODE_SCALPEL_LICENSE_PATH=/path/to/license.jwt
claude mcp add codescalpel uvx codescalpel mcp

Method 3: Manual Configuration

Edit your claude_desktop_config.json manually:

{
  "mcpServers": {
    "codescalpel": {
      "command": "uvx",
      "args": ["codescalpel", "mcp"],
      "env": {
        "CODE_SCALPEL_LICENSE_PATH": "/path/to/license.jwt"
      }
    }
  }
}

Verify Your License

Check that your license is recognized:

uvx codescalpel tier-info

Expected output for Pro/Enterprise:

Current Tier: pro (or enterprise)
License Status: Valid
Expires: 2025-12-31

Alternative: Manual Configuration

If you prefer to edit configuration files manually:

Claude Desktop (macOS/Windows/Linux): Edit ~/.claude/claude_desktop_config.json and add:

{
  "mcpServers": {
    "codescalpel": {
      "command": "uvx",
      "args": ["codescalpel", "mcp"]
    }
  }
}

VS Code / Cursor: Edit .vscode/mcp.json in your workspace:

{
  "mcpServers": {
    "codescalpel": {
      "command": "uvx",
      "args": ["codescalpel", "mcp"]
    }
  }
}

Network Deployments: HTTP Transports

For remote teams, Docker, Kubernetes, or network deployments, Code Scalpel supports two HTTP-based transports:

SSE (Server-Sent Events) - Best for remote teams and Docker:

codescalpel mcp --transport sse --host 0.0.0.0 --port 8080

streamable-http - Best for production systems and load balancers:

codescalpel mcp --transport streamable-http --host 0.0.0.0 --port 8080

With HTTPS for production:

codescalpel mcp --transport sse --ssl-cert cert.pem --ssl-key key.pem

Client configuration (SSE):

{
  "mcpServers": {
    "code-scalpel": {
      "url": "http://localhost:8080/sse",
      "transport": "sse"
    }
  }
}

Client configuration (streamable-http):

{
  "mcpServers": {
    "code-scalpel": {
      "url": "http://localhost:8080/mcp",
      "transport": "http"
    }
  }
}

See the MCP Transports Guide for comprehensive setup instructions, security configuration, and deployment examples.


Troubleshooting

"Command not found: uvx"?

pip install uv

MCP server not showing up in Claude?

  1. Restart Claude Code or Claude Desktop
  2. Check that uvx codescalpel works in your terminal:
    uvx codescalpel --version
    
  3. If still not working, try manual configuration (see above)

Debug mode: Enable verbose logging:

export SCALPEL_MCP_OUTPUT=DEBUG
claude mcp add codescalpel uvx codescalpel mcp

Debug license validation:

export SCALPEL_MCP_OUTPUT=DEBUG
export CODE_SCALPEL_LICENSE_PATH=/path/to/license.jwt  # If needed
claude mcp add codescalpel uvx codescalpel mcp

CLI Usage

All 22 MCP tools are now available directly from the command line!

In addition to the MCP server interface, Code Scalpel provides dedicated CLI commands for every tool. This is perfect for:

  • Scripts and automation - Integrate into CI/CD pipelines
  • Manual analysis - Quick command-line access without an MCP client
  • Shell workflows - Pipe JSON output between tools

Quick Start

# Install Code Scalpel
pip install codescalpel

# View all available commands
codescalpel --help

# Get help for any specific command
codescalpel extract-code --help

Common CLI Commands

CommandDescriptionExample
codescalpel extract-codeExtract functions/classes with dependenciescodescalpel extract-code src/api.py --function handler
codescalpel analyzePerform AST and static analysiscodescalpel analyze src/main.py --json
codescalpel scanSecurity vulnerability detectioncodescalpel scan src/
codescalpel get-call-graphGenerate function call graphscodescalpel get-call-graph src/app.py
codescalpel get-file-contextGet file structure overviewcodescalpel get-file-context src/models.py
codescalpel get-symbol-referencesFind all symbol usagescodescalpel get-symbol-references MyClass
codescalpel rename-symbolSafe symbol renamingcodescalpel rename-symbol src/api.py old_name new_name
codescalpel generate-unit-testsAI-powered test generationcodescalpel generate-unit-tests src/utils.py
codescalpel cross-file-security-scanCross-file taint analysiscodescalpel cross-file-security-scan
codescalpel validate-pathsValidate import pathscodescalpel validate-paths src/main.py

See all 22 commands: Complete CLI Tools Reference →

Example Workflows

Extract and Analyze a Function

# Extract function with dependencies
codescalpel extract-code src/api.py --function process_payment --include-deps > extracted.py

# Analyze the extracted code
codescalpel analyze extracted.py --json

# Generate comprehensive tests
codescalpel generate-unit-tests extracted.py

Security Audit Pipeline

# Run basic security scan
codescalpel scan src/

# Deep cross-file taint analysis
codescalpel cross-file-security-scan --max-depth 10

# Check policy compliance
codescalpel code-policy-check src/ --strict

Refactoring with Impact Analysis

# Get current call graph
codescalpel get-call-graph src/auth.py

# Find all references
codescalpel get-symbol-references UserAuthentication

# Simulate refactor
codescalpel simulate-refactor src/auth.py --changes "rename UserAuthentication to AuthService"

# Perform rename
codescalpel rename-symbol src/auth.py UserAuthentication AuthService

JSON Output for Automation

All commands support --json flag for machine-readable output:

# Get JSON output
codescalpel analyze src/main.py --json | jq '.functions[] | .name'

# Pipe between commands
codescalpel crawl-project --json | jq '.high_complexity_files[]' | \
  xargs -I {} codescalpel analyze {} --json

Tier System

All CLI tools respect the same three-tier licensing system as the MCP server:

  • Community (Free): All tools available with basic limits
  • Pro: Enhanced limits, cross-file analysis, parallel processing
  • Enterprise: Unlimited thresholds, advanced features

Check your current tier and limits:

codescalpel capabilities

For complete CLI documentation, see CLI Tools Reference.


Release Information

Launch Date: January 2026 Version: v2.1.1 License: MIT (Community)

Code Scalpel is built for the new era of Agentic Engineering. It is not just a linter; it is the sensory and actuator system for the next generation of AI developers.


Documentation

Community

Have questions? Open an issue or start a discussion.

Related Servers