[20260312_DOCS] Updated guide links and anchors to match the current website structure.
Guides¶
In-depth guides for specific use cases, integrations, and workflows.
Integration Guides¶
-
AI Assistant Integration
Deep integration with Claude, VS Code Copilot, Cursor, and other AI assistants.
-
MCP Transport Types
Complete guide to stdio, SSE, and HTTP transports for local and network deployments.
-
Deployment Compatibility Matrix
Comprehensive compatibility matrix for all MCP deployment scenarios and platforms.
-
Authentication & Security
Complete authentication guide with reverse proxy setup, OAuth, and production security.
-
DevOps & CI/CD
Integrate Code Scalpel into your CI/CD pipelines for automated security and quality gates.
Use Case Guides¶
-
Security Analysis
Comprehensive security scanning, vulnerability detection, and remediation.
-
Enterprise Deployment
Large-scale deployment, Enterprise-tier compliance checks, governance, and multi-team setups.
-
Positioning
Public-facing explanations of why deterministic tooling and governed AI software development matter.
Quick Links¶
| Guide | Best For |
|---|---|
| AI Integration | Setting up AI assistants with Code Scalpel |
| MCP Transports | Choosing and configuring stdio, SSE, or HTTP transport |
| Deployment Matrix | Platform compatibility, cloud deployments |
| Authentication | Security, authentication, remote access control |
| DevOps | CI/CD integration, GitHub Actions, GitLab CI |
| Security | Vulnerability detection, compliance, audits |
| Enterprise | Organization-wide rollout, governance |
| Positioning | Public-facing product and governance story |
| Architecture Positioning | Flagship system view for governed AI software development |
| Technical Foundations | AST, IR, graph, and symbolic workflow overview |
Popular Topics¶
Setting Up¶
- Configure Claude Desktop
- Configure VS Code
- Choose transport type
- Check platform compatibility
- Authentication for remote deployments
- Docker deployment
- Cloud deployments
- Network/remote deployments
Security¶
- Authentication overview
- Reverse proxy setup
- Production security checklist
- Network security best practices
- Cross-file vulnerability detection
- Compliance checking
- Custom security rules