Tool Deep Dives¶
Detailed documentation for every Code Scalpel tool, including complete parameter references, response schemas, examples, and best practices.
Analysis Tools¶
| Tool | Description |
|---|---|
| analyze_code | Parse and extract code structure |
| get_file_context | Get file overview without full content |
| crawl_project | Analyze entire project directory |
Context Tools¶
| Tool | Description |
|---|---|
| get_symbol_references | Find all references to a symbol |
| get_cross_file_dependencies | Analyze cross-file dependency chains |
Extraction Tools¶
| Tool | Description |
|---|---|
| extract_code | Surgical extraction by symbol name |
| update_symbol | Safely replace code symbols |
| rename_symbol | Rename symbols across codebase |
Security Tools¶
| Tool | Description |
|---|---|
| security_scan | Taint-based vulnerability detection |
| unified_sink_detect | Polyglot sink detection |
| cross_file_security_scan | Cross-module taint tracking |
| scan_dependencies | Scan for vulnerable dependencies |
| type_evaporation_scan | Detect TypeScript type evaporation |
Graph Tools¶
| Tool | Description |
|---|---|
| get_call_graph | Generate call graphs |
| get_graph_neighborhood | Extract k-hop subgraph |
| get_project_map | Generate project structure map |
Symbolic Execution Tools¶
| Tool | Description |
|---|---|
| symbolic_execute | Symbolic path exploration |
| generate_unit_tests | Generate tests from symbolic execution |
| simulate_refactor | Verify refactoring safety |
Policy Tools¶
| Tool | Description |
|---|---|
| validate_paths | Validate path accessibility |
| verify_policy_integrity | Verify policy file integrity |
| code_policy_check | Check code against policies |
Tool Selection Guide¶
graph TD
A[What do you need?] --> B{Understand Code}
A --> C{Modify Code}
A --> D{Find Issues}
A --> E{Navigate}
B --> B1[analyze_code<br/>Structure analysis]
B --> B2[get_file_context<br/>Quick overview]
B --> B3[crawl_project<br/>Full project]
C --> C1[extract_code<br/>Get symbol code]
C --> C2[update_symbol<br/>Replace safely]
C --> C3[rename_symbol<br/>Rename everywhere]
D --> D1[security_scan<br/>Single file]
D --> D2[cross_file_security_scan<br/>Multi-file]
D --> D3[scan_dependencies<br/>CVEs]
E --> E1[get_call_graph<br/>Call flow]
E --> E2[get_symbol_references<br/>Find usages]
E --> E3[get_project_map<br/>Overview]