@adityasasidhar/project-scope-mcp
v1.0.0
Published
MCP server for repository analysis, Git operations, and code refactoring tools
Maintainers
Readme
Project Scope MCP Server
A robust, production-ready Model Context Protocol (MCP) server empowering AI agents with deep semantic understanding and safe manipulation of software repositories.
Overview
Project Scope moves beyond simple file reading to provide semantic analysis, AST-based refactoring, Git integration, and defense-in-depth security validation. It allows Large Language Models (LLMs) to interact with codebases reliably and safely, bridging the gap between chat interfaces and complex development workflows.
Key Features
- Semantic Repository Analysis: Parse and understand code structure, dependencies, and relationships using Tree-sitter.
- Context-Aware Security: Advanced scanner with zero false positives on source code, detecting SQLi, XSS, and RCE attempts in runtime inputs.
- Safe Refactoring: AST-based renaming and extraction tools with "preview first" capabilities to prevent syntax errors.
- Git Integration: Comprehensive version control management including history, diffing, and branch operations.
- Defense-in-Depth: Multi-layered protection including Prompt Injection detection (Regex + LLM Guard), input validation, and file access controls.
Table of Contents
- Installation
- Configuration
- Security Architecture
- Connecting Clients
- Tool Reference
- Troubleshooting
- License
Installation
# Install dependencies
npm install
# Build the project
npm run buildConfiguration
Security is a primary focus of Project Scope. The server is highly customizable to match your risk profile.
Security Modes
strict(default): Blocks operations immediately if a potential threat is detected.advisory: Logs and warnings are generated, but operations are allowed to proceed (useful for initial audits).
Sensitivity Levels
high: Aggressive detection, useful for untrusted user inputs.medium(default): Balanced profile for standard development.low: Only flags high-confidence known attack signatures.
LLM Guard (Optional)
For state-of-the-art protection against prompt injection attacks, enable Meta Llama Prompt Guard 2:
- Set
useGuardModel: truein your requests. - Requires a valid HuggingFace API token.
Security Architecture
The server features a Context-Aware Security Scanner designed to eliminate false positives while maintaining rigorous threat detection.
Intelligent Context Detection
The scanner uses file categorization to determine the appropriate validation strategy:
| File Type | Extension | Scanning Strategy | Reason |
|-----------|-----------|-------------------|--------|
| Source Code | .ts, .py, .go | Skipped | Source code syntax (semi-colons, pipes) mimics attack patterns. |
| Templates | .hbs, .jinja2 | Syntax-Aware | Validates usage but allows standard template tokens. |
| Config | .json, .yaml | Minimal | Allows standard configuration strings. |
| Runtime Input | (None) | Strict | Full regex and heuristic scanning for malicious payloads. |
Line-Level Filtering
Within analyzed files, the engine intelligently ignores:
- Comments:
//,/*,# - Imports:
import,require - Definitions:
interface,type,class
This ensures that documenting a security vulnerability in a comment or test file does not trigger a false alarm, while executing or receiving a malicious payload is caught.
🔌 Connecting Clients
Claude Desktop
Open your configuration file:
- macOS:
~/Library/Application Support/Claude/claude_desktop_config.json - Windows:
%APPDATA%\Claude\claude_desktop_config.json
- macOS:
Add the server definition:
{
"mcpServers": {
"project-scope": {
"command": "node",
"args": ["/absolute/path/to/ProjectScopeMCP/dist/index.js"]
}
}
}Claude Code (CLI)
The official Claude Code CLI supports MCP natively.
Add the server: Run the following command in your terminal:
claude mcp add project-scope -- npx -y @adityasasidhar/project-scope-mcpVerify: Run
claudeand type/mcpto see the connected servers.
Codex CLI
Codex CLI (if applicable) supports MCP via its TOML configuration.
Edit Configuration: Open
~/.codex/config.toml.Add Server:
[mcp.servers.project-scope] command = "npx" args = ["-y", "@adityasasidhar/project-scope-mcp"]
Gemini CLI
Gemini CLI supports MCP via its JSON configuration.
Edit Configuration: Open
~/.gemini/settings.json(create if it doesn't exist).Add Server:
{ "mcpServers": { "project-scope": { "command": "npx", "args": ["-y", "@adityasasidhar/project-scope-mcp"] } } }
Generic Clients
For any other client that supports MCP (like Windsurf, Smithery, Goose, or custom implementations), use the standard stdio configuration:
npx -y @adityasasidhar/project-scope-mcpCursor
- Open Cursor Settings (Cmd/Ctrl + Shift + J).
- Navigate to Features > MCP Servers.
- Click + Add New MCP Server.
- Configure:
- Name:
project-scope - Type:
command - Command:
node /absolute/path/to/ProjectScopeMCP/dist/index.js(Or usenpm run startif preferred)
- Name:
GitHub Copilot (VS Code)
- Open GitHub Copilot Chat in VS Code.
- Click the Attach Context (paperclip) or Tools icons.
- Select Connect to MCP Server...
- Choose Command (or similar) and enter:
- Command:
npx - Args:
-y @adityasasidhar/project-scope-mcp
- Command:
Note: Requires GitHub Copilot Agent Mode enabled in VS Code settings.
Tool Reference
Repository Analysis
get_repo_structure
Generates a hierarchical map of the repository, respecting .gitignore.
- input:
{ "path": "/path/to/repo", "format": "tree" }
analyze_impact
Predicts the "blast radius" of changing a symbol (function, variable) by finding all references via AST.
- input:
{ "path": "...", "filePath": "src/utils.ts", "symbolName": "processData", "line": 42 }
Security Scanning
scan_repo_for_threats
Audits the entire repository for security risks (secrets, injection patterns). Skips ignored files for performance.
- input:
{ "path": "/path/to/repo", "excludePatterns": ["dist"] }
scan_file_for_threats
Deep-scans a single file or string with the context-aware engine.
- input:
{ "filePath": "/path/to/file.ts", "mode": "strict" }
validate_shell_input
Validates shell commands for injection risks before execution.
- input:
{ "input": "rm -rf /", "mode": "strict" }
Refactoring
refactor_rename
Semantically renames a symbol across the project.
- input:
{ "path": "...", "filePath": "...", "oldName": "foo", "newName": "bar", "apply": false } - Note: Always use
"apply": falsefirst to preview changes.
refactor_extract_function
Extracts selected lines of code into a new function.
- input:
{ "path": "...", "filePath": "...", "startLine": 10, "endLine": 20, "functionName": "newFunc" }
Git Operations
Includes standard Git tools for agentic workflows:
git_statusgit_commit_historygit_compare_branchesgit_init
Troubleshooting
"Repo Scan Too Slow"
- Add large directories (e.g.,
vendor,node_modules) toexcludePatterns. - Large files (>1MB) are automatically skipped.
"Refactoring Failed to Parse"
- Ensure the code is syntactically valid before refactoring. Tree-sitter parsers typically require valid syntax to generate accurate ASTs.
License
This project is licensed under the ISC License.
