Code Reaper
CodeReaper is an AI-driven MCP tool for Cursor that finds and removes dead JavaScript by exploring real UIs and capturing V8 coverage
CodeReaper
CodeReaper is an AI-driven MCP tool for Cursor that finds and removes dead JavaScript by exploring real UIs and capturing V8 coverage.
Key Features
- Autonomous UI exploration via the Index browser agent
- V8 precise coverage to identify zero-execution functions
- Risk scoring and removal recommendations
- Patch generation and optional verification replay
- MCP integration for Cursor workflows
Quick Install
pip install codereaper
playwright install chromium
codereaper
When you first run codereaper, it prompts for your Gemini API key and saves it in your global ~/.cursor/mcp.json so Cursor can invoke it later.
Alternative Install
# pipx
pipx run codereaper
Prerequisites
- Python 3.11+
- Playwright Chromium (installed via
playwright install chromium) - A Gemini API key (or OpenAI / Anthropic if you change providers)
Quick Start
- Install and run
codereaper(it updates~/.cursor/mcp.json) - Restart Cursor
- Ask the assistant:
"Find dead JavaScript code on http://localhost:3000"
Usage
Command:
codereaper
Example scan with local source mapping:
"Find dead code on http://localhost:3000, source is in ./test_site"
MCP Tools
| Tool | Description |
|---|---|
find_dead_code | Full pipeline: scan + analyze. Returns dead-code report with file paths, line numbers, risk scores, and removal recommendations. |
scan_website | Scan only (no analysis). Returns scan_id for later use. |
analyze_dead_code | Analyze a completed scan. Takes scan_id. |
generate_patches | Generate unified diffs to remove dead code (conservative / balanced / aggressive). |
get_patch_diff | Retrieve the combined diff for a patch. |
apply_patch | Apply a patch to source files (stores snapshots for rollback). |
verify_patch | Re-run the browser agent to check for regressions after patching. |
rollback_patch | Restore original files from pre-patch snapshots. |
list_scans | List recent scans. |
get_scan_status | Get detailed status of a scan. |
Troubleshooting
- If the browser doesn’t open, install Chromium:
playwright install chromium - If the scan fails with key errors, ensure
GEMINI_API_KEYexists in~/.cursor/mcp.json - If local pages don’t load, confirm your dev server is running and reachable
- If Gemini rate limits hit, retry after the quota window resets
Update
- 02-09-2026: v0.2.3 release
Issues & Feedback
Open an issue with steps to reproduce and logs if possible. Feedback and suggestions are welcome.
Servidores relacionados
Scout Monitoring MCP
patrocinadorPut performance and error data directly in the hands of your AI assistant.
Alpha Vantage MCP Server
patrocinadorAccess financial market data: realtime & historical stock, ETF, options, forex, crypto, commodities, fundamentals, technical indicators, & more
Python Weather Server
A FastAPI-based server that provides weather information from the National Weather Service API, secured with OAuth 2.1.
Remote MCP Server (Authless)
An example of a remote MCP server without authentication, deployable on Cloudflare Workers.
Rust Docs MCP Server
Query up-to-date documentation for Rust crates.
ALAPI
ALAPI MCP Tools,Call hundreds of API interfaces via MCP
Jenkins Server MCP
A tool for interacting with Jenkins CI/CD servers, requiring environment variables for configuration.
SuperCollider MCP Server
An MCP server for the SuperCollider programming language that executes synths using supercolliderjs.
WTP - Worktree Plus
Let agents manage Git worktrees via the wtp CLI.
Hound MCP
Hound is a free, open-source MCP server that gives AI coding agents a nose for supply chain security. It scans packages for vulnerabilities, checks licenses, inspects dependency trees, and detects typosquatting — with zero API keys, zero config, and zero cost.
MCP Framework
A TypeScript framework for building Model Context Protocol (MCP) servers.
Storybook MCP
Help agents automatically write and test stories for your UI components