Built-in MCP Tools

CodeGraph exposes 93 built-in tools via the MCP server (python -m src.mcp). Each tool name starts with codegraph_ and is callable by any MCP-compatible client. All tools are read-only unless explicitly noted. Tools that access the CPG database resolve the path automatically via ProjectManager.

Call Graph & Navigation

codegraph_find_callers

Find all upstream callers of a method, including transitive callers up to a configurable depth.

Parameters: method_name (str), max_depth (int, optional; defaults to configured value), direct_only (bool, default false)

codegraph_find_callees

Find all methods called by the given method, including transitive callees.

Parameters: method_name (str), max_depth (int, optional; defaults to configured value), direct_only (bool, default false)

codegraph_impact

Analyze the blast radius of changes to a method. Returns direct/transitive callers, affected methods, and an impact score.

Parameters: method_name (str)

Code Analysis

codegraph_query

Execute a SQL query on the CPG database. Only SELECT queries are allowed.

Parameters: sql (str), limit (int, optional; defaults to configured value)

Search the codebase using hybrid semantic and graph search. Matches method names, full names, and code content.

Parameters: query (str), limit (int, optional; defaults to configured value)

codegraph_explain

Get comprehensive analysis of a method: metrics (complexity, fan-in/out), call graph, security properties, location, and pattern flags. Suggests similar names if the method is not found.

Parameters: method_name (str)

codegraph_diagram

Generate architecture diagrams in Mermaid format: call graph, file dependency, or component diagram.

Parameters: diagram_type (str: “callgraph” | “dependency” | “component”, default “callgraph”), target (str, default “”)

codegraph_hotspots

Find code hotspots ranked by a metric: cyclomatic complexity, caller count (fan-in), PageRank importance, or betweenness centrality.

Parameters: metric (str: “complexity” | “callers” | “pagerank” | “betweenness”, default “complexity”), limit (int, optional; defaults to configured value)

codegraph_edit_preview

Preview AST information for a code target before editing. Returns type, location, caller count, and code preview for safe refactoring.

Parameters: file_path (str), target_name (str), target_type (str: “function” | “class” | “method”, default “function”)

Security

codegraph_taint_analysis

Run taint analysis to find data flow paths from sources to sinks. Traces how untrusted data flows through the codebase.

Parameters: method_name (str), source_category (str, default “user_input”), sink_category (str, default “sql”)

codegraph_autofix

Generate automated fix suggestions for security vulnerabilities. Runs taint analysis, then produces template-based or LLM-powered patches. Read-only: returns diffs without applying changes.

Parameters: method_name (str), cwe (str, default “”)

SCA / SBOM

codegraph_sbom_generate

Generate SBOM (Software Bill of Materials) for a project.

Parameters: format (str: “cyclonedx” | “spdx”, default “cyclonedx”), project (str, default “” — uses active project)

codegraph_sbom_audit

Audit project dependencies for known vulnerabilities.

Parameters: sources (str, default “osv” — comma-separated: osv, nvd, bdu_fstec), fail_on (str: “critical” | “high” | “medium” | “low”, default “” — no threshold), format (str: “json” | “sarif” | “markdown” | “gost”, default “json”), project (str, default “”)

codegraph_sbom_sync

Sync local vulnerability cache.

Parameters: sources (str, default “osv,nvd,bdu_fstec” — comma-separated), force (bool, default false — full re-sync)

Supply Chain

codegraph_supply_chain_scan

Scan supply chain for security risks: typosquatting, low trust, integrity issues.

Parameters: format (str: “json” | “sarif” | “markdown” | “gost”, default “json”), fail_on (str, default “” — severity threshold), language (str: “en” | “ru”, default “ru”), project (str, default “”)

codegraph_supply_chain_trust

Assess trust scores for project dependencies.

Parameters: min_score (float, default 0.0), project (str, default “”)

Threat Modeling

codegraph_threat_model_generate

Generate STRIDE threat model from project CPG.

Parameters: min_severity (str: “low” | “medium” | “high” | “critical”, default “low”), include_inferred (bool, default true), language (str: “en” | “ru”, default “ru”), format (str: “json” | “markdown”, default “json”)

codegraph_threat_model_dfd

Generate Data Flow Diagram from project CPG.

Parameters: format (str: “mermaid” | “json”, default “mermaid”)

Workflows

codegraph_compose

Run a composite analysis workflow combining multiple scenarios in parallel or sequentially.

Parameters: query (str), orchestrator (str: “s18” | “s19” | “optimization” | “standards”, default “s18”), language (str: “en” | “ru”, default “en”)

codegraph_compliance

Check codebase compliance against coding standards and regulations via the compliance workflow (scenario 08).

Parameters: query (str, default “Check compliance”), standard (str, default “”)

codegraph_compliance_gost

Evaluate GOST R 56939-2024 compliance for the active project. Collects artifacts from CPG, SARIF, config, tests, and git history, evaluates all 25 GOST processes, and renders a compliance report.

Parameters: action (str: “evaluate” | “checklist” | “traceability” | “history” | “delta”, default “evaluate”), format (str: “markdown” | “json” | “gost”, default “markdown”), language (str: “ru” | “en”, default “ru”), process_filter (str, default “”), include_traceability (bool, default false), report_id_old (str, default “”), report_id_new (str, default “”)

codegraph_compliance_report_57580

Generate GOST R 57580.3 compliance report.

Parameters: project (str, default “”), type (str: “executive” | “infosec” | “maturity” | “full”, default “executive”), format (str: “json” | “markdown”, default “json”), language (str: “ru” | “en”, default “ru”)

codegraph_compliance_maturity

Assess process maturity per GOST R 57580.2.

Parameters: project (str, default “”)

codegraph_compliance_report_delta

Compare two GOST R 57580.3 reports (delta analysis).

Parameters: old_id (str, required), new_id (str, required)

codegraph_cross_repo

Analyze cross-repository dependencies and interactions. Identifies shared interfaces, common patterns, and cross-cutting concerns.

Parameters: query (str, default “Analyze cross-repository dependencies”), analysis_type (str: “full” | “interfaces” | “patterns”, default “full”)

codegraph_tech_debt

Get technical debt summary: dead method count, complexity hotspots, and overall quality score.

Parameters: none

codegraph_standards_check

Run coding standards check on the codebase via the composite workflow (scenario 19): compliance, code quality, and optimization.

Parameters: query (str, default “Check coding standards”), category (str, default “”), severity (str, default “”)

codegraph_docs_sync

Check documentation coverage across all CodeGraph interfaces. Discovers code entities and compares them against markdown docs to find undocumented entities, stale docs, and signature mismatches.

Parameters: interfaces (str, default “” — comma-separated: rest_api, cli, tui, mcp, acp, grpc, websocket), language (str: “en” | “ru”, default “en”), output_format (str: “markdown” | “json”, default “markdown”)

Audit Diff

codegraph_audit_diff

Diff warnings between two analysis runs (GOST R 71207-2024, section 8.9).

Parameters: run1 (str, default “”), run2 (str, default “”), hide_fp (bool, default false), compare_last (bool, default false), project (str, default “”)

codegraph_scopes_check

Check analysis scope for a file (GOST R 71207-2024, section 5.4).

Parameters: file_path (str, required), severity (str: “low” | “medium” | “high” | “critical”, default “medium”), rule_id (str, default “”)

codegraph_audit_progress

Aggregate new, fixed, and remaining findings for a reporting period.

Parameters: from_date (str YYYY-MM-DD, required), to_date (str YYYY-MM-DD, required), project (str, default “”)

codegraph_analysis_status

Show when the last full scan happened and whether a new analysis run is due.

Parameters: project (str, default “”)

Dynamic Analysis

codegraph_dynamic_import

Import dynamic analysis results (SARIF, Valgrind, sanitizer logs).

Parameters: input_path (str, default “”), format (str: “sarif” | “valgrind” | “sanitizer”, default “sarif”), content (str, default “”), project (str, default “”), commit (str, default “”)

codegraph_dynamic_runs

List dynamic analysis runs.

Parameters: project (str, default “”), limit (int, default 20)

codegraph_dynamic_correlate

Correlate static and dynamic findings.

Parameters: static_findings_json (str), dynamic_run_id (str, default “”), dynamic_findings_json (str, default “”), line_tolerance (int, default 10)

codegraph_dynamic_fuzz_targets

Generate prioritized fuzz targets from CPG.

Parameters: language (str, default “”), max_targets (int, default 50), min_priority (float, default 0.3)

Issue Tracker

codegraph_issues_create

Create an issue in the configured tracker from a finding.

Parameters: title (str, required), description (str, default “”), severity (str: “critical” | “high” | “medium” | “low”, default “medium”), finding_id (str, default “”), cwe_id (str, default “”), file_path (str, default “”), line (int, default 0)

codegraph_issues_bulk_create

Create issues from a list of findings.

Parameters: findings (str JSON array, default “[]”)

codegraph_issues_sync

Bidirectional sync between CodeGraph findings and issue tracker.

Parameters: findings (str JSON array, default “[]”), tracked_issues (str JSON object, default “{}”), close_on_fix (bool, default true), min_severity (str, default “high”)

codegraph_issues_status

Get current status of an issue from the tracker.

Parameters: issue_id (str, required)

Release Gate

codegraph_release_gate_check

Run release gate checks for the active project. Evaluates readiness across multiple check types (tests, security, compliance, documentation, SCA, patterns).

Parameters: profile (str: “gost-56939” | “standard” | “minimal”, default “standard”), version (str, default “”), format (str: “json” | “markdown”, default “json”), language (str: “en” | “ru”, default “ru”)

codegraph_release_gate_profiles

List available release gate profiles with their check configurations.

Parameters: none

codegraph_release_gate_suppress

Manage release gate suppressions (accepted risks). List, add, or remove suppressions.

Parameters: action (str: “list” | “add” | “remove”, default “list”), finding_id (str, default “”), reason (str, default “”), expires_at (str, default “” — ISO date), project (str, default “”)

Risk Management (GOST R 57580.3)

codegraph_risk_kir

Calculate Key Risk Indicators (KIR) from CPG data. Returns 8 predefined KIR values with threshold status (NORMAL/SIGNAL/CONTROL).

Parameters: project (str, default “”), format (str: “json” | “markdown”, default “json”)

codegraph_risk_kpur

Calculate Control Risk Level Indicators (KPUR) by 3 groups: losses (OPR.11.1), operational reliability (OPR.11.2), unauthorized operations (OPR.11.3).

Parameters: project (str, default “”)

codegraph_risk_dashboard

Full risk dashboard: KIR values + KPUR status + alerts. Calculates all risk indicators, checks thresholds, and returns a comprehensive dashboard with overall risk status.

Parameters: project (str, default “”)

codegraph_risk_assess

Risk assessment using SVR × STP matrix per GOST R 57580.3-2022. Calculates threat realization probability (SVR) and consequence severity (STP) for each hypothesis finding, builds 5×5 risk matrix, and generates risk register.

Parameters: project (str, default “”), format (str: “json” | “markdown” | “gost”, default “json”), language (str: “ru” | “en”, default “ru”)

codegraph_risk_matrix

Risk matrix 5×5 (SVR × STP) showing finding distribution. Returns 25-cell matrix with counts of findings at each SVR/STP intersection.

Parameters: project (str, default “”)

codegraph_risk_detail

Detailed risk assessment for a specific finding. Shows SVR/STP factors, risk score, mitigations, and residual risk.

Parameters: finding_id (str — required), project (str, default “”)

codegraph_risk_threat_model_57580

Generate GOST R 57580.3 threat model. Produces a 5-section threat model: sources, intruder profiles, vulnerabilities, ATT&CK techniques, and threat inventory.

Parameters: project (str, default “”), format (str: “json” | “markdown” | “gost”, default “json”), language (str: “ru” | “en”, default “ru”)

codegraph_risk_events

Get classified risk events per GOST R 57580.3 appendices A-D. Returns events classified by 4 dimensions: source, type, activity, losses.

Parameters: project (str, default “”), classification (str, default “” — filter by dimension: source, type, activity, or loss)

codegraph_risk_checklist

Generate self-assessment checklist per GOST R 57580.3. Evaluates ~80 measures with auto-detection of technical capabilities.

Parameters: project (str, default “”), level (int: 1 | 2 | 3, default 2)

Context & Analysis

codegraph_project_context

Get full context of the active CodeGraph project: metadata, CPG database statistics (method/file/call counts), available tables, detected language, domain plugin info, and top-level complexity hotspots. Use as a starting point before making queries.

Parameters: none

codegraph_diff_context

Analyze the impact of code changes using the CPG. Returns per-file impact: affected methods, their callers (blast radius), security findings delta, and complexity changes. Use before committing or during code review.

Parameters: base_ref (str, default “HEAD~1” — git ref to diff against), changed_files (str, default “” — comma-separated file paths, alternative to base_ref)

codegraph_file_context

Get CPG analysis context for a specific file: all methods with metrics (complexity, fan-in/out), call relationships, security findings, dead code flags, and pattern violations. Use before reviewing or modifying a file.

Parameters: file_path (str — relative path to source file, e.g. “src/api/main.py”)

Project Management

codegraph_project_list

List all registered projects with their status: name, language, active flag, database path, domain, and existence check.

Parameters: none

codegraph_project_switch

Switch the active project by name. Updates config.yaml, activates the domain plugin, and resets workflow components.

Parameters: name (str)

codegraph_project_rename

Rename a project in the registry. Validates uniqueness and updates the active project reference if needed.

Parameters: old_name (str), new_name (str)

codegraph_project_delete

Delete a project from the registry. Cannot delete the active project. Optionally removes DuckDB files and ChromaDB vector collections.

Parameters: name (str), delete_data (bool, default false)

Infrastructure

codegraph_import_status

Check project import status, list supported languages, or list registered projects.

Parameters: action (str: “status” | “languages” | “projects”, default “status”)

codegraph_config

Introspect CodeGraph configuration (read-only). Available sections: summary, timeouts, llm, retrieval.

Parameters: section (str: “summary” | “timeouts” | “llm” | “retrieval”, default “summary”)

codegraph_domain

Manage domain plugins for language-specific analysis. List available domains, show active domain, or inspect domain details.

Parameters: action (str: “list” | “active” | “info”, default “list”), domain_name (str, default “”)

codegraph_ci_exec

Execute CI-related CPG operations: show database stats, validate database integrity, or run a pattern scan.

Parameters: action (str: “status” | “validate” | “scan”, default “status”), db_path (str, default “”)

codegraph_watch

Monitor CPG database freshness for the active project. Show current status, check whether re-parse is required, or trigger incremental update when stale.

Parameters: action (str: “status” | “check” | “update”, default “status”)

Structured output highlights:

  • check: returns project, db_path, last_parse, cpg_commit, head_commit, commits_behind, commits_behind_strict, is_fresh, is_fresh_strict, has_relevant_changes_since_cpg, freshness_reason, needs_update.
  • update: returns updated, before, after, attempted, failure_kind, locker_pids, auto_unlock_attempted, auto_unlock_killed_pids, auto_unlock_errors, next_step, next_command, and command/output tails for troubleshooting.

codegraph_hooks

Introspect webhook and hook configuration. List configured webhook endpoints or show platform configuration.

Parameters: action (str: “list” | “config”, default “list”)

codegraph_cli_bridge

Introspect available CLI commands (read-only, does not execute). Lists commands and their help text for AI agent discovery.

Parameters: action (str: “list” | “help”, default “list”)

Patterns

Search for structural code patterns using AST-based matching with metavariables (e.g., malloc($SIZE)).

Parameters: pattern (str), language (str), max_results (int, optional; defaults to configured value)

codegraph_pattern_findings

Query persisted structural pattern findings from the cpg_pattern_results table produced by gocpg scan.

Parameters: rule_id (str, optional), severity (str, optional: “error” | “warning” | “info” | “hint”), filename (str, optional), category (str, optional), limit (int, optional; defaults to configured value)

codegraph_pattern_stats

Get aggregated statistics for structural pattern findings grouped by severity, category, and rule.

Parameters: none

codegraph_pattern_fix

Apply structural pattern fixes via SSR rules. Runs gocpg scan --fix to apply AST-aware code transformations. Returns unified diffs.

Parameters: rule_id (str, optional), dry_run (bool, default true)

codegraph_pattern_generate

Generate and validate a YAML pattern rule from a natural language description. Uses LLM generation with up to 3 validation retries.

Parameters: description (str), language (str), with_fix (bool, default true)

codegraph_pattern_test

Test a YAML pattern rule against a code snippet. Validates the rule and returns match count and fix preview.

Parameters: rule_yaml (str), code_snippet (str), language (str)

Enterprise

codegraph_vault

Manage HashiCorp Vault integration for secret management. Check connection and authentication status.

Parameters: action (str: “status” | “health”, default “status”)

codegraph_siem

Manage SIEM integration for security event dispatching. Check dispatcher status or show buffer statistics.

Parameters: action (str: “status” | “stats”, default “status”)

codegraph_rbac

Inspect RBAC roles and permissions. List available roles or show permissions for a specific role.

Parameters: action (str: “roles” | “permissions”, default “roles”), role (str: “VIEWER” | “ANALYST” | “REVIEWER” | “ADMIN”, default “”)

Platform Integration

codegraph_sc_review

Review a SourceCraft merge request using CPG analysis.

Parameters: project_id (str), mr_iid (int), token (str), url (str, default “https://api.sourcecraft.yandex.cloud”), task_description (str, default “”)

codegraph_sc_suggestions

Get code context suggestions at cursor position for SourceCraft IDE. Returns method info, callers, callees, and type information.

Parameters: file_path (str), line (int), column (int, default 0)

codegraph_sc_completion

Get code completion context for SourceCraft IDE. Provides prefix-matched symbols, type info, and import suggestions.

Parameters: file_path (str), line (int), prefix (str, default “”)

codegraph_sc_navigate

Navigate to symbol definition, references, and call hierarchy.

Parameters: symbol (str), file_path (str, default “”)

codegraph_sc_test_hints

Get test generation hints for a method. Analyzes callers, parameters, and edge cases to suggest test scenarios.

Parameters: method_name (str), file_path (str, default “”)

codegraph_sc_mr_info

Get SourceCraft merge request information and diff.

Parameters: project_id (str), mr_iid (int), token (str), url (str, default “https://api.sourcecraft.yandex.cloud”)

codegraph_sc_commit_status

Update commit pipeline status in SourceCraft.

Parameters: project_id (str), commit_sha (str), state (str: “pending” | “running” | “success” | “failed” | “canceled”), token (str), url (str, default “https://api.sourcecraft.yandex.cloud”)

codegraph_sc_summary

Generate a summary for a SourceCraft merge request from diff content.

Parameters: diff_content (str), title (str, default “”), description (str, default “”)

codegraph_gv_review

Review a GitVerse pull request using CPG analysis.

Parameters: project_id (str, owner/repo format), pr_number (int), token (str), url (str, default “https://gitverse.ru/api/v1”), task_description (str, default “”)

codegraph_gv_pr_info

Get GitVerse pull request information and diff.

Parameters: project_id (str, owner/repo format), pr_number (int), token (str), url (str, default “https://gitverse.ru/api/v1”)

codegraph_gv_commit_status

Update commit status in GitVerse.

Parameters: project_id (str, owner/repo format), commit_sha (str), state (str: “pending” | “running” | “success” | “failed” | “canceled”), token (str), url (str, default “https://gitverse.ru/api/v1”)

codegraph_gv_summary

Generate a summary for a GitVerse pull request from diff content.

Parameters: diff_content (str), title (str, default “”), description (str, default “”)

codegraph_hypothesis

Run hypothesis-driven security analysis on the CPG database. Generates and validates security hypotheses based on the CWE/CAPEC knowledge base, or lists available CWEs and pattern providers.

Parameters:

Parameter Type Default Description
action str One of run, list_cwes, list_providers
language str "C" Target programming language (e.g. "C", "Python", "Java")
max_hypotheses int 50 Maximum number of hypotheses to generate and validate
min_priority float 0.3 Minimum priority score threshold (0.0–1.0)
category str "" Vulnerability category filter (e.g. "memory", "injection")
human_language str "en" Output language: "en" or "ru"

Actions:

  • run — Generate and validate hypotheses against the active project CPG. Returns batch statistics (confirmed/rejected/inconclusive counts, precision, recall, F1 score) and a list of confirmed findings with evidence.
  • list_cwes — List CWE database entries, optionally filtered by category.
  • list_providers — List registered pattern providers with their supported languages.

codegraph_reindex

Manage vector search collections for the active project. Supports indexing, incremental updates, deletion, and documentation generation from CPG.

Parameters:

Parameter Type Default Description
action str "status" One of status, index, incremental, delete, generate
collection str "" Collection name for targeted indexing (empty = all). Valid: code_snippets, qa_pairs, documentation, sql_examples, code_comments, domain_patterns
replace bool false Delete and recreate collections before indexing
language str "en" Language for doc generation: "en" or "ru"
sections str "" Comma-separated doc sections for generate (empty = all). Valid: mvd_doc, module_overview, function_doc, pipeline_doc, business_logic_doc, type_doc, coverage_doc, diagram_doc

Actions:

  • status — Show collection document counts for the active project.
  • index — Index all or a specific collection. Use replace=true to recreate.
  • incremental — Index only changed files since last sync (uses cpg_file_state).
  • delete — Delete all vector collections for the active project.
  • generate — Generate documentation from CPG and index it into the documentation collection.

Dashboard V2 MCP Tools

Dashboard V2 MCP tools provide CISO/CTO data for portfolio visibility, project drill-down, trends, period and release comparisons, saved views, risk alerting, and compliance heatmaps. All tools are read-only. Data is sourced from the CPG database, audit results, release gate checks, SCA findings, and compliance evaluations.

codegraph_dashboard_portfolio

Get an aggregated portfolio health overview across all registered projects. Returns per-project health scores, risk distribution, and overall portfolio status.

Parameters:

Parameter Type Default Description
group str "" Filter projects by group name (empty = all groups)
format str "json" Output format: "json" or "markdown"
language str "ru" Output language: "en" or "ru"

Response format:

{
  "portfolio": {
    "total_projects": 8,
    "avg_health_score": 72.5,
    "risk_distribution": {
      "critical": 1,
      "high": 2,
      "medium": 3,
      "low": 2
    },
    "projects": [
      {
        "name": "payments-api",
        "group": "backend",
        "health_score": 85.0,
        "audit_score": 90.0,
        "compliance_score": 78.0,
        "release_status": "ready",
        "sca_health": 92.0,
        "risk_level": "low",
        "last_audit": "2026-03-15T10:30:00Z"
      }
    ]
  },
  "generated_at": "2026-03-17T12:00:00Z"
}

codegraph_dashboard_saved_views

Manage persistent dashboard saved views.

Parameters: action (str: “list” | “get” | “save” | “delete”, default “list”), user_id (str, default “mcp-user”), view_id (str, default “”), name (str, default “”), scope (str, default “portfolio”), filters_json (str JSON object, default “{}”), projects (str comma-separated, default “”), view_format (str, default “json”)

codegraph_dashboard_metrics

Get canonical dashboard metric samples for Grafana-style dashboards.

Parameters: group_id (str, default “”), organization (str, default “”), team (str, default “”), environment (str, default “”), criticality (str, default “”), language (str, default “”), domain (str, default “”), service_type (str, default “”), min_risk (str, default “”)

codegraph_dashboard_project

Get detailed dashboard data for a single project. Returns health scores, findings breakdown, compliance status, release gate results, and SCA summary.

Parameters:

Parameter Type Default Description
project str "" Project name (empty = active project)
format str "json" Output format: "json" or "markdown"
language str "ru" Output language: "en" or "ru"

Response format:

{
  "project": "payments-api",
  "health_score": 85.0,
  "audit": {
    "score": 90.0,
    "findings_by_severity": {
      "critical": 0,
      "high": 2,
      "medium": 5,
      "low": 12
    },
    "dimensions": {
      "security": 92.0,
      "code_quality": 88.0,
      "documentation": 85.0
    }
  },
  "compliance": {
    "score": 78.0,
    "standard": "GOST-56939",
    "passed_processes": 20,
    "total_processes": 25
  },
  "release_gate": {
    "status": "ready",
    "profile": "standard",
    "checks_passed": 5,
    "checks_total": 6,
    "failed_checks": ["sca"]
  },
  "sca": {
    "health": 92.0,
    "total_dependencies": 45,
    "vulnerable": 3,
    "critical_vulnerabilities": 0,
    "high_vulnerabilities": 1
  },
  "generated_at": "2026-03-17T12:00:00Z"
}

Get time-series trend data for dashboard metrics over a configurable period. Returns historical health, audit, and compliance scores for trend visualization.

Parameters:

Parameter Type Default Description
project str "" Project name (empty = active project)
period str "30d" Time period: "7d", "30d", "90d", "180d", "365d"
metrics str "" Comma-separated metric names to include (empty = all). Valid: health_score, audit_score, compliance_score, sca_health
format str "json" Output format: "json" or "markdown"

Response format:

{
  "project": "payments-api",
  "period": "30d",
  "data_points": [
    {
      "date": "2026-02-15",
      "health_score": 70.0,
      "audit_score": 75.0,
      "compliance_score": 65.0,
      "sca_health": 88.0
    },
    {
      "date": "2026-03-17",
      "health_score": 85.0,
      "audit_score": 90.0,
      "compliance_score": 78.0,
      "sca_health": 92.0
    }
  ],
  "trend_direction": {
    "health_score": "improving",
    "audit_score": "improving",
    "compliance_score": "improving",
    "sca_health": "stable"
  },
  "generated_at": "2026-03-17T12:00:00Z"
}

codegraph_dashboard_compare_periods

Compare two adjacent snapshot-backed periods for a project.

Parameters: name (str, required), baseline_period (str: “7d” | “30d” | “90d” | “180d” | “1y”, default “30d”), comparison_period (str: “7d” | “30d” | “90d” | “180d” | “1y”, default “7d”)

codegraph_dashboard_release_compare

Compare two release gate runs and attach snapshot deltas where available.

Parameters: name (str, required), from_run_id (str, default “”), to_run_id (str, default “”)

codegraph_dashboard_drilldown

Drill down from a project/category aggregate to findings and source locations.

Parameters: name (str, required), category (str, required), limit (int, default 50)

codegraph_dashboard_red_zone

Identify projects in the “red zone” – those failing critical thresholds for health, compliance, or security. Returns a prioritized list with reasons and recommended actions.

Parameters:

Parameter Type Default Description
group str "" Filter projects by group name (empty = all groups)
threshold float 50.0 Health score threshold below which a project enters the red zone (0.0–100.0)
format str "json" Output format: "json" or "markdown"
language str "ru" Output language: "en" or "ru"

Response format:

{
  "red_zone_count": 2,
  "threshold": 50.0,
  "projects": [
    {
      "name": "legacy-auth",
      "group": "backend",
      "health_score": 35.0,
      "reasons": [
        "Critical SCA vulnerabilities: 3",
        "Compliance score below 40%",
        "Release gate: blocked"
      ],
      "recommended_actions": [
        "Patch critical CVEs immediately",
        "Run compliance evaluation and address gaps",
        "Review and fix release gate failures"
      ],
      "days_in_red_zone": 12
    }
  ],
  "generated_at": "2026-03-17T12:00:00Z"
}

codegraph_dashboard_compare

Compare two or more projects side by side across all dashboard dimensions. Useful for benchmarking teams or tracking relative progress.

Parameters:

Parameter Type Default Description
projects str Comma-separated project names (required, minimum 2)
format str "json" Output format: "json" or "markdown"
language str "ru" Output language: "en" or "ru"

Response format:

{
  "comparison": [
    {
      "project": "payments-api",
      "health_score": 85.0,
      "audit_score": 90.0,
      "compliance_score": 78.0,
      "release_status": "ready",
      "sca_health": 92.0,
      "findings_total": 19,
      "critical_findings": 0
    },
    {
      "project": "legacy-auth",
      "health_score": 35.0,
      "audit_score": 45.0,
      "compliance_score": 38.0,
      "release_status": "blocked",
      "sca_health": 60.0,
      "findings_total": 47,
      "critical_findings": 3
    }
  ],
  "best_in_class": {
    "health_score": "payments-api",
    "audit_score": "payments-api",
    "compliance_score": "payments-api",
    "sca_health": "payments-api"
  },
  "generated_at": "2026-03-17T12:00:00Z"
}

codegraph_dashboard_compliance_heatmap

Generate a compliance heatmap showing process-level compliance status across multiple projects. Each cell represents one project’s status for one GOST R 56939 process.

Parameters:

Parameter Type Default Description
group str "" Filter projects by group name (empty = all groups)
standard str "gost-56939" Compliance standard: "gost-56939"
format str "json" Output format: "json" or "markdown"
language str "ru" Output language: "en" or "ru"

Response format:

```json { “standard”: “gost-56939”, “processes”: [“5.1”, “5.2”, “5.3”, “5.4”, “5.5”, “5.6”, “5.7”, “5.8”, “5.9”, “5.10”], “projects”: [ { “name”: “payments-api”, “statuses”: { “5.1”: “compliant”, “5.2”: “compliant”, “5.3”: “partial”, “5.4”: “compliant”, “5.5”: “non_compliant”, “5.6”: “compliant”, “5.7”: “partial”, “5.8”: “compliant”, “5.9”: “compliant”, “5.10”: “partial” }, “overall_score”: 78.0 } ], “legend”: { “compliant”: “All requirements met”, “partial”: “Some requirements met”, “non_compliant”: “Requirements not met”, “not_evaluated”: “Not yet evaluated” }, “generated_at”: “2026-03-17T12:00:00Z” }