Tools Matrix
Complete overview of all 22 Code Scalpel MCP tools and their tier availability
| Tool Name | Category | Community | Pro | Enterprise | Key Features |
|---|---|---|---|---|---|
analyze_code |
Analysis |
✓ Full |
✓ Full |
✓ Full |
AST parsing, functions, classes, complexity metrics |
get_file_context |
Analysis |
✓ Basic |
✓ Semantic |
✓ + Compliance |
File summary, imports, security warnings |
crawl_project |
Analysis |
100 files |
1000 files |
✓ Unlimited |
Project-wide analysis, hotspot detection, metrics |
get_project_map |
Analysis |
100 files |
✓ Enhanced |
✓ Full |
Architecture visualization, modules, dependencies |
extract_code |
Extraction |
Single-file |
Depth 1 |
✓ Unlimited |
Extract functions, classes, methods by name |
get_call_graph |
Extraction |
Depth 10, 200 nodes |
✓ Unlimited |
✓ Full |
Function call chains, dependency tracing |
get_cross_file_dependencies |
Extraction |
Depth 3, 200 files |
✓ Unlimited |
✓ Full |
Cross-file dependencies, imports, references |
update_symbol |
Modification |
Single-file |
Depth 1 |
✓ Unlimited |
Safe code replacement with validation, backups |
rename_symbol |
Modification |
Single-file |
✓ Project-wide |
✓ Full |
Refactor symbols across project, update refs |
simulate_refactor |
Modification |
Basic analysis |
✓ Advanced |
✓ Full |
Preview refactoring impact without executing |
security_scan |
Security |
✓ File |
✓ Project |
✓ Full + Policy |
Taint analysis, CWE mapping, vulnerability paths |
cross_file_security_scan |
Security |
50 modules, depth 5 |
✓ Unlimited |
✓ Full |
Cross-file taint tracking, data flow analysis |
code_policy_check |
Security |
100 files, 50 rules |
✓ Enhanced |
✓ Full + Crypto |
Policy enforcement, compliance rules, audit logs |
scan_dependencies |
Security |
✓ |
✓ Enhanced |
✓ Full |
Dependency analysis, vulnerability detection, updates |
get_symbol_references |
Intelligence |
Single-file |
✓ Project |
✓ Full |
Find all symbol usages, references, definitions |
get_graph_neighborhood |
Intelligence |
k=2, 100 nodes |
✓ Unlimited |
✓ Full |
Dependency neighborhood, impact analysis |
generate_unit_tests |
Advanced |
10 test cases |
✓ Unlimited |
✓ Full |
Auto-generate unit tests with coverage tracking |
symbolic_execute |
Advanced |
100 paths, depth 10 |
✓ Unlimited |
✓ Full |
Symbolic execution, constraint solving |
type_evaporation_scan |
Advanced |
50 files, frontend |
✓ Full-stack |
✓ Full |
Type safety analysis, type assertion tracking |
unified_sink_detect |
Advanced |
50 sinks |
✓ Unlimited |
✓ Full |
Unified sink detection, output validation |
verify_policy_integrity |
Advanced |
50 files, basic |
✓ Enhanced |
✓ Full |
Policy verification, cryptographic proof, audit evidence |
validate_paths |
Advanced |
100 paths |
✓ Unlimited |
✓ Full |
Code path validation, reachability analysis |
Tier Comparison Summary
- Community: All 22 tools with sensible limits, single-file focus, MIT license
- Pro: All 22 tools with enhanced limits, project-wide analysis, requires license
- Enterprise: All 22 tools unlimited, plus governance, policy verification, cryptographic proofs, on-premise deployment
📋 Important Details
File Selection (Pro Limits): When Pro tier file limits are exceeded (e.g., 1,000 files in crawl_project), files are selected lexicographically (alphabetically by path) after filtering ignored directories. This ensures deterministic, reproducible behavior.
Grace Period: All tiers include a 7-day grace period for expired licenses. Pro/Enterprise tools revert to Community limits after the grace period.
Offline Usage: License validation is offline (JWT cryptographic verification). Online checks happen every 24 hours to validate revocation status, with a 48-hour grace period if network is unavailable.
Audit Logs (Enterprise): Centralized tamper-resistant logging to audit.log. All tools using audit trails automatically gain disk-backed logging.
Known Limitations: See our Known Limitations page for transparency about edge cases and design trade-offs.