CodeGraph exposes 93 built-in tools via the MCP server (python -m src.mcp). Each tool name starts with codegraph_ and is callable by any MCP-compatible client. All tools are read-only unless explicitly noted. Tools that access the CPG database resolve the path automatically via ProjectManager.
Call Graph & Navigation¶
codegraph_find_callers¶
Find all upstream callers of a method, including transitive callers up to a configurable depth.
Parameters: method_name (str), max_depth (int, optional; defaults to configured value), direct_only (bool, default false)
codegraph_find_callees¶
Find all methods called by the given method, including transitive callees.
Parameters: method_name (str), max_depth (int, optional; defaults to configured value), direct_only (bool, default false)
codegraph_impact¶
Analyze the blast radius of changes to a method. Returns direct/transitive callers, affected methods, and an impact score.
Parameters: method_name (str)
Code Analysis¶
codegraph_query¶
Execute a SQL query on the CPG database. Only SELECT queries are allowed.
Parameters: sql (str), limit (int, optional; defaults to configured value)
codegraph_search¶
Search the codebase using hybrid semantic and graph search. Matches method names, full names, and code content.
Parameters: query (str), limit (int, optional; defaults to configured value)
codegraph_explain¶
Get comprehensive analysis of a method: metrics (complexity, fan-in/out), call graph, security properties, location, and pattern flags. Suggests similar names if the method is not found.
Parameters: method_name (str)
codegraph_diagram¶
Generate architecture diagrams in Mermaid format: call graph, file dependency, or component diagram.
Parameters: diagram_type (str: “callgraph” | “dependency” | “component”, default “callgraph”), target (str, default “”)
codegraph_hotspots¶
Find code hotspots ranked by a metric: cyclomatic complexity, caller count (fan-in), PageRank importance, or betweenness centrality.
Parameters: metric (str: “complexity” | “callers” | “pagerank” | “betweenness”, default “complexity”), limit (int, optional; defaults to configured value)
codegraph_edit_preview¶
Preview AST information for a code target before editing. Returns type, location, caller count, and code preview for safe refactoring.
Parameters: file_path (str), target_name (str), target_type (str: “function” | “class” | “method”, default “function”)
Security¶
codegraph_taint_analysis¶
Run taint analysis to find data flow paths from sources to sinks. Traces how untrusted data flows through the codebase.
Parameters: method_name (str), source_category (str, default “user_input”), sink_category (str, default “sql”)
codegraph_autofix¶
Generate automated fix suggestions for security vulnerabilities. Runs taint analysis, then produces template-based or LLM-powered patches. Read-only: returns diffs without applying changes.
Parameters: method_name (str), cwe (str, default “”)
SCA / SBOM¶
codegraph_sbom_generate¶
Generate SBOM (Software Bill of Materials) for a project.
Parameters: format (str: “cyclonedx” | “spdx”, default “cyclonedx”), project (str, default “” — uses active project)
codegraph_sbom_audit¶
Audit project dependencies for known vulnerabilities.
Parameters: sources (str, default “osv” — comma-separated: osv, nvd, bdu_fstec), fail_on (str: “critical” | “high” | “medium” | “low”, default “” — no threshold), format (str: “json” | “sarif” | “markdown” | “gost”, default “json”), project (str, default “”)
codegraph_sbom_sync¶
Sync local vulnerability cache.
Parameters: sources (str, default “osv,nvd,bdu_fstec” — comma-separated), force (bool, default false — full re-sync)
Supply Chain¶
codegraph_supply_chain_scan¶
Scan supply chain for security risks: typosquatting, low trust, integrity issues.
Parameters: format (str: “json” | “sarif” | “markdown” | “gost”, default “json”), fail_on (str, default “” — severity threshold), language (str: “en” | “ru”, default “ru”), project (str, default “”)
codegraph_supply_chain_trust¶
Assess trust scores for project dependencies.
Parameters: min_score (float, default 0.0), project (str, default “”)
Threat Modeling¶
codegraph_threat_model_generate¶
Generate STRIDE threat model from project CPG.
Parameters: min_severity (str: “low” | “medium” | “high” | “critical”, default “low”), include_inferred (bool, default true), language (str: “en” | “ru”, default “ru”), format (str: “json” | “markdown”, default “json”)
codegraph_threat_model_dfd¶
Generate Data Flow Diagram from project CPG.
Parameters: format (str: “mermaid” | “json”, default “mermaid”)
Workflows¶
codegraph_compose¶
Run a composite analysis workflow combining multiple scenarios in parallel or sequentially.
Parameters: query (str), orchestrator (str: “s18” | “s19” | “optimization” | “standards”, default “s18”), language (str: “en” | “ru”, default “en”)
codegraph_compliance¶
Check codebase compliance against coding standards and regulations via the compliance workflow (scenario 08).
Parameters: query (str, default “Check compliance”), standard (str, default “”)
codegraph_compliance_gost¶
Evaluate GOST R 56939-2024 compliance for the active project. Collects artifacts from CPG, SARIF, config, tests, and git history, evaluates all 25 GOST processes, and renders a compliance report.
Parameters: action (str: “evaluate” | “checklist” | “traceability” | “history” | “delta”, default “evaluate”), format (str: “markdown” | “json” | “gost”, default “markdown”), language (str: “ru” | “en”, default “ru”), process_filter (str, default “”), include_traceability (bool, default false), report_id_old (str, default “”), report_id_new (str, default “”)
codegraph_compliance_report_57580¶
Generate GOST R 57580.3 compliance report.
Parameters: project (str, default “”), type (str: “executive” | “infosec” | “maturity” | “full”, default “executive”), format (str: “json” | “markdown”, default “json”), language (str: “ru” | “en”, default “ru”)
codegraph_compliance_maturity¶
Assess process maturity per GOST R 57580.2.
Parameters: project (str, default “”)
codegraph_compliance_report_delta¶
Compare two GOST R 57580.3 reports (delta analysis).
Parameters: old_id (str, required), new_id (str, required)
codegraph_cross_repo¶
Analyze cross-repository dependencies and interactions. Identifies shared interfaces, common patterns, and cross-cutting concerns.
Parameters: query (str, default “Analyze cross-repository dependencies”), analysis_type (str: “full” | “interfaces” | “patterns”, default “full”)
codegraph_tech_debt¶
Get technical debt summary: dead method count, complexity hotspots, and overall quality score.
Parameters: none
codegraph_standards_check¶
Run coding standards check on the codebase via the composite workflow (scenario 19): compliance, code quality, and optimization.
Parameters: query (str, default “Check coding standards”), category (str, default “”), severity (str, default “”)
codegraph_docs_sync¶
Check documentation coverage across all CodeGraph interfaces. Discovers code entities and compares them against markdown docs to find undocumented entities, stale docs, and signature mismatches.
Parameters: interfaces (str, default “” — comma-separated: rest_api, cli, tui, mcp, acp, grpc, websocket), language (str: “en” | “ru”, default “en”), output_format (str: “markdown” | “json”, default “markdown”)
Audit Diff¶
codegraph_audit_diff¶
Diff warnings between two analysis runs (GOST R 71207-2024, section 8.9).
Parameters: run1 (str, default “”), run2 (str, default “”), hide_fp (bool, default false), compare_last (bool, default false), project (str, default “”)
codegraph_scopes_check¶
Check analysis scope for a file (GOST R 71207-2024, section 5.4).
Parameters: file_path (str, required), severity (str: “low” | “medium” | “high” | “critical”, default “medium”), rule_id (str, default “”)
codegraph_audit_progress¶
Aggregate new, fixed, and remaining findings for a reporting period.
Parameters: from_date (str YYYY-MM-DD, required), to_date (str YYYY-MM-DD, required), project (str, default “”)
codegraph_analysis_status¶
Show when the last full scan happened and whether a new analysis run is due.
Parameters: project (str, default “”)
Dynamic Analysis¶
codegraph_dynamic_import¶
Import dynamic analysis results (SARIF, Valgrind, sanitizer logs).
Parameters: input_path (str, default “”), format (str: “sarif” | “valgrind” | “sanitizer”, default “sarif”), content (str, default “”), project (str, default “”), commit (str, default “”)
codegraph_dynamic_runs¶
List dynamic analysis runs.
Parameters: project (str, default “”), limit (int, default 20)
codegraph_dynamic_correlate¶
Correlate static and dynamic findings.
Parameters: static_findings_json (str), dynamic_run_id (str, default “”), dynamic_findings_json (str, default “”), line_tolerance (int, default 10)
codegraph_dynamic_fuzz_targets¶
Generate prioritized fuzz targets from CPG.
Parameters: language (str, default “”), max_targets (int, default 50), min_priority (float, default 0.3)
Issue Tracker¶
codegraph_issues_create¶
Create an issue in the configured tracker from a finding.
Parameters: title (str, required), description (str, default “”), severity (str: “critical” | “high” | “medium” | “low”, default “medium”), finding_id (str, default “”), cwe_id (str, default “”), file_path (str, default “”), line (int, default 0)
codegraph_issues_bulk_create¶
Create issues from a list of findings.
Parameters: findings (str JSON array, default “[]”)
codegraph_issues_sync¶
Bidirectional sync between CodeGraph findings and issue tracker.
Parameters: findings (str JSON array, default “[]”), tracked_issues (str JSON object, default “{}”), close_on_fix (bool, default true), min_severity (str, default “high”)
codegraph_issues_status¶
Get current status of an issue from the tracker.
Parameters: issue_id (str, required)
Release Gate¶
codegraph_release_gate_check¶
Run release gate checks for the active project. Evaluates readiness across multiple check types (tests, security, compliance, documentation, SCA, patterns).
Parameters: profile (str: “gost-56939” | “standard” | “minimal”, default “standard”), version (str, default “”), format (str: “json” | “markdown”, default “json”), language (str: “en” | “ru”, default “ru”)
codegraph_release_gate_profiles¶
List available release gate profiles with their check configurations.
Parameters: none
codegraph_release_gate_suppress¶
Manage release gate suppressions (accepted risks). List, add, or remove suppressions.
Parameters: action (str: “list” | “add” | “remove”, default “list”), finding_id (str, default “”), reason (str, default “”), expires_at (str, default “” — ISO date), project (str, default “”)
Risk Management (GOST R 57580.3)¶
codegraph_risk_kir¶
Calculate Key Risk Indicators (KIR) from CPG data. Returns 8 predefined KIR values with threshold status (NORMAL/SIGNAL/CONTROL).
Parameters: project (str, default “”), format (str: “json” | “markdown”, default “json”)
codegraph_risk_kpur¶
Calculate Control Risk Level Indicators (KPUR) by 3 groups: losses (OPR.11.1), operational reliability (OPR.11.2), unauthorized operations (OPR.11.3).
Parameters: project (str, default “”)
codegraph_risk_dashboard¶
Full risk dashboard: KIR values + KPUR status + alerts. Calculates all risk indicators, checks thresholds, and returns a comprehensive dashboard with overall risk status.
Parameters: project (str, default “”)
codegraph_risk_assess¶
Risk assessment using SVR × STP matrix per GOST R 57580.3-2022. Calculates threat realization probability (SVR) and consequence severity (STP) for each hypothesis finding, builds 5×5 risk matrix, and generates risk register.
Parameters: project (str, default “”), format (str: “json” | “markdown” | “gost”, default “json”), language (str: “ru” | “en”, default “ru”)
codegraph_risk_matrix¶
Risk matrix 5×5 (SVR × STP) showing finding distribution. Returns 25-cell matrix with counts of findings at each SVR/STP intersection.
Parameters: project (str, default “”)
codegraph_risk_detail¶
Detailed risk assessment for a specific finding. Shows SVR/STP factors, risk score, mitigations, and residual risk.
Parameters: finding_id (str — required), project (str, default “”)
codegraph_risk_threat_model_57580¶
Generate GOST R 57580.3 threat model. Produces a 5-section threat model: sources, intruder profiles, vulnerabilities, ATT&CK techniques, and threat inventory.
Parameters: project (str, default “”), format (str: “json” | “markdown” | “gost”, default “json”), language (str: “ru” | “en”, default “ru”)
codegraph_risk_events¶
Get classified risk events per GOST R 57580.3 appendices A-D. Returns events classified by 4 dimensions: source, type, activity, losses.
Parameters: project (str, default “”), classification (str, default “” — filter by dimension: source, type, activity, or loss)
codegraph_risk_checklist¶
Generate self-assessment checklist per GOST R 57580.3. Evaluates ~80 measures with auto-detection of technical capabilities.
Parameters: project (str, default “”), level (int: 1 | 2 | 3, default 2)
Context & Analysis¶
codegraph_project_context¶
Get full context of the active CodeGraph project: metadata, CPG database statistics (method/file/call counts), available tables, detected language, domain plugin info, and top-level complexity hotspots. Use as a starting point before making queries.
Parameters: none
codegraph_diff_context¶
Analyze the impact of code changes using the CPG. Returns per-file impact: affected methods, their callers (blast radius), security findings delta, and complexity changes. Use before committing or during code review.
Parameters: base_ref (str, default “HEAD~1” — git ref to diff against), changed_files (str, default “” — comma-separated file paths, alternative to base_ref)
codegraph_file_context¶
Get CPG analysis context for a specific file: all methods with metrics (complexity, fan-in/out), call relationships, security findings, dead code flags, and pattern violations. Use before reviewing or modifying a file.
Parameters: file_path (str — relative path to source file, e.g. “src/api/main.py”)
Project Management¶
codegraph_project_list¶
List all registered projects with their status: name, language, active flag, database path, domain, and existence check.
Parameters: none
codegraph_project_switch¶
Switch the active project by name. Updates config.yaml, activates the domain plugin, and resets workflow components.
Parameters: name (str)
codegraph_project_rename¶
Rename a project in the registry. Validates uniqueness and updates the active project reference if needed.
Parameters: old_name (str), new_name (str)
codegraph_project_delete¶
Delete a project from the registry. Cannot delete the active project. Optionally removes DuckDB files and ChromaDB vector collections.
Parameters: name (str), delete_data (bool, default false)
Infrastructure¶
codegraph_import_status¶
Check project import status, list supported languages, or list registered projects.
Parameters: action (str: “status” | “languages” | “projects”, default “status”)
codegraph_config¶
Introspect CodeGraph configuration (read-only). Available sections: summary, timeouts, llm, retrieval.
Parameters: section (str: “summary” | “timeouts” | “llm” | “retrieval”, default “summary”)
codegraph_domain¶
Manage domain plugins for language-specific analysis. List available domains, show active domain, or inspect domain details.
Parameters: action (str: “list” | “active” | “info”, default “list”), domain_name (str, default “”)
codegraph_ci_exec¶
Execute CI-related CPG operations: show database stats, validate database integrity, or run a pattern scan.
Parameters: action (str: “status” | “validate” | “scan”, default “status”), db_path (str, default “”)
codegraph_watch¶
Monitor CPG database freshness for the active project. Show current status, check whether re-parse is required, or trigger incremental update when stale.
Parameters: action (str: “status” | “check” | “update”, default “status”)
Structured output highlights:
check: returnsproject,db_path,last_parse,cpg_commit,head_commit,commits_behind,commits_behind_strict,is_fresh,is_fresh_strict,has_relevant_changes_since_cpg,freshness_reason,needs_update.update: returnsupdated,before,after,attempted,failure_kind,locker_pids,auto_unlock_attempted,auto_unlock_killed_pids,auto_unlock_errors,next_step,next_command, and command/output tails for troubleshooting.
codegraph_hooks¶
Introspect webhook and hook configuration. List configured webhook endpoints or show platform configuration.
Parameters: action (str: “list” | “config”, default “list”)
codegraph_cli_bridge¶
Introspect available CLI commands (read-only, does not execute). Lists commands and their help text for AI agent discovery.
Parameters: action (str: “list” | “help”, default “list”)
Patterns¶
codegraph_pattern_search¶
Search for structural code patterns using AST-based matching with metavariables (e.g., malloc($SIZE)).
Parameters: pattern (str), language (str), max_results (int, optional; defaults to configured value)
codegraph_pattern_findings¶
Query persisted structural pattern findings from the cpg_pattern_results table produced by gocpg scan.
Parameters: rule_id (str, optional), severity (str, optional: “error” | “warning” | “info” | “hint”), filename (str, optional), category (str, optional), limit (int, optional; defaults to configured value)
codegraph_pattern_stats¶
Get aggregated statistics for structural pattern findings grouped by severity, category, and rule.
Parameters: none
codegraph_pattern_fix¶
Apply structural pattern fixes via SSR rules. Runs gocpg scan --fix to apply AST-aware code transformations. Returns unified diffs.
Parameters: rule_id (str, optional), dry_run (bool, default true)
codegraph_pattern_generate¶
Generate and validate a YAML pattern rule from a natural language description. Uses LLM generation with up to 3 validation retries.
Parameters: description (str), language (str), with_fix (bool, default true)
codegraph_pattern_test¶
Test a YAML pattern rule against a code snippet. Validates the rule and returns match count and fix preview.
Parameters: rule_yaml (str), code_snippet (str), language (str)
Enterprise¶
codegraph_vault¶
Manage HashiCorp Vault integration for secret management. Check connection and authentication status.
Parameters: action (str: “status” | “health”, default “status”)
codegraph_siem¶
Manage SIEM integration for security event dispatching. Check dispatcher status or show buffer statistics.
Parameters: action (str: “status” | “stats”, default “status”)
codegraph_rbac¶
Inspect RBAC roles and permissions. List available roles or show permissions for a specific role.
Parameters: action (str: “roles” | “permissions”, default “roles”), role (str: “VIEWER” | “ANALYST” | “REVIEWER” | “ADMIN”, default “”)
Platform Integration¶
codegraph_sc_review¶
Review a SourceCraft merge request using CPG analysis.
Parameters: project_id (str), mr_iid (int), token (str), url (str, default “https://api.sourcecraft.yandex.cloud”), task_description (str, default “”)
codegraph_sc_suggestions¶
Get code context suggestions at cursor position for SourceCraft IDE. Returns method info, callers, callees, and type information.
Parameters: file_path (str), line (int), column (int, default 0)
codegraph_sc_completion¶
Get code completion context for SourceCraft IDE. Provides prefix-matched symbols, type info, and import suggestions.
Parameters: file_path (str), line (int), prefix (str, default “”)
codegraph_sc_navigate¶
Navigate to symbol definition, references, and call hierarchy.
Parameters: symbol (str), file_path (str, default “”)
codegraph_sc_test_hints¶
Get test generation hints for a method. Analyzes callers, parameters, and edge cases to suggest test scenarios.
Parameters: method_name (str), file_path (str, default “”)
codegraph_sc_mr_info¶
Get SourceCraft merge request information and diff.
Parameters: project_id (str), mr_iid (int), token (str), url (str, default “https://api.sourcecraft.yandex.cloud”)
codegraph_sc_commit_status¶
Update commit pipeline status in SourceCraft.
Parameters: project_id (str), commit_sha (str), state (str: “pending” | “running” | “success” | “failed” | “canceled”), token (str), url (str, default “https://api.sourcecraft.yandex.cloud”)
codegraph_sc_summary¶
Generate a summary for a SourceCraft merge request from diff content.
Parameters: diff_content (str), title (str, default “”), description (str, default “”)
codegraph_gv_review¶
Review a GitVerse pull request using CPG analysis.
Parameters: project_id (str, owner/repo format), pr_number (int), token (str), url (str, default “https://gitverse.ru/api/v1”), task_description (str, default “”)
codegraph_gv_pr_info¶
Get GitVerse pull request information and diff.
Parameters: project_id (str, owner/repo format), pr_number (int), token (str), url (str, default “https://gitverse.ru/api/v1”)
codegraph_gv_commit_status¶
Update commit status in GitVerse.
Parameters: project_id (str, owner/repo format), commit_sha (str), state (str: “pending” | “running” | “success” | “failed” | “canceled”), token (str), url (str, default “https://gitverse.ru/api/v1”)
codegraph_gv_summary¶
Generate a summary for a GitVerse pull request from diff content.
Parameters: diff_content (str), title (str, default “”), description (str, default “”)
codegraph_hypothesis¶
Run hypothesis-driven security analysis on the CPG database. Generates and validates security hypotheses based on the CWE/CAPEC knowledge base, or lists available CWEs and pattern providers.
Parameters:
| Parameter | Type | Default | Description |
|---|---|---|---|
action |
str | — | One of run, list_cwes, list_providers |
language |
str | "C" |
Target programming language (e.g. "C", "Python", "Java") |
max_hypotheses |
int | 50 |
Maximum number of hypotheses to generate and validate |
min_priority |
float | 0.3 |
Minimum priority score threshold (0.0–1.0) |
category |
str | "" |
Vulnerability category filter (e.g. "memory", "injection") |
human_language |
str | "en" |
Output language: "en" or "ru" |
Actions:
run— Generate and validate hypotheses against the active project CPG. Returns batch statistics (confirmed/rejected/inconclusive counts, precision, recall, F1 score) and a list of confirmed findings with evidence.list_cwes— List CWE database entries, optionally filtered bycategory.list_providers— List registered pattern providers with their supported languages.
codegraph_reindex¶
Manage vector search collections for the active project. Supports indexing, incremental updates, deletion, and documentation generation from CPG.
Parameters:
| Parameter | Type | Default | Description |
|---|---|---|---|
action |
str | "status" |
One of status, index, incremental, delete, generate |
collection |
str | "" |
Collection name for targeted indexing (empty = all). Valid: code_snippets, qa_pairs, documentation, sql_examples, code_comments, domain_patterns |
replace |
bool | false |
Delete and recreate collections before indexing |
language |
str | "en" |
Language for doc generation: "en" or "ru" |
sections |
str | "" |
Comma-separated doc sections for generate (empty = all). Valid: mvd_doc, module_overview, function_doc, pipeline_doc, business_logic_doc, type_doc, coverage_doc, diagram_doc |
Actions:
status— Show collection document counts for the active project.index— Index all or a specific collection. Usereplace=trueto recreate.incremental— Index only changed files since last sync (usescpg_file_state).delete— Delete all vector collections for the active project.generate— Generate documentation from CPG and index it into thedocumentationcollection.
Dashboard V2 MCP Tools¶
Dashboard V2 MCP tools provide CISO/CTO data for portfolio visibility, project drill-down, trends, period and release comparisons, saved views, risk alerting, and compliance heatmaps. All tools are read-only. Data is sourced from the CPG database, audit results, release gate checks, SCA findings, and compliance evaluations.
codegraph_dashboard_portfolio¶
Get an aggregated portfolio health overview across all registered projects. Returns per-project health scores, risk distribution, and overall portfolio status.
Parameters:
| Parameter | Type | Default | Description |
|---|---|---|---|
group |
str | "" |
Filter projects by group name (empty = all groups) |
format |
str | "json" |
Output format: "json" or "markdown" |
language |
str | "ru" |
Output language: "en" or "ru" |
Response format:
{
"portfolio": {
"total_projects": 8,
"avg_health_score": 72.5,
"risk_distribution": {
"critical": 1,
"high": 2,
"medium": 3,
"low": 2
},
"projects": [
{
"name": "payments-api",
"group": "backend",
"health_score": 85.0,
"audit_score": 90.0,
"compliance_score": 78.0,
"release_status": "ready",
"sca_health": 92.0,
"risk_level": "low",
"last_audit": "2026-03-15T10:30:00Z"
}
]
},
"generated_at": "2026-03-17T12:00:00Z"
}
codegraph_dashboard_saved_views¶
Manage persistent dashboard saved views.
Parameters: action (str: “list” | “get” | “save” | “delete”, default “list”), user_id (str, default “mcp-user”), view_id (str, default “”), name (str, default “”), scope (str, default “portfolio”), filters_json (str JSON object, default “{}”), projects (str comma-separated, default “”), view_format (str, default “json”)
codegraph_dashboard_metrics¶
Get canonical dashboard metric samples for Grafana-style dashboards.
Parameters: group_id (str, default “”), organization (str, default “”), team (str, default “”), environment (str, default “”), criticality (str, default “”), language (str, default “”), domain (str, default “”), service_type (str, default “”), min_risk (str, default “”)
codegraph_dashboard_project¶
Get detailed dashboard data for a single project. Returns health scores, findings breakdown, compliance status, release gate results, and SCA summary.
Parameters:
| Parameter | Type | Default | Description |
|---|---|---|---|
project |
str | "" |
Project name (empty = active project) |
format |
str | "json" |
Output format: "json" or "markdown" |
language |
str | "ru" |
Output language: "en" or "ru" |
Response format:
{
"project": "payments-api",
"health_score": 85.0,
"audit": {
"score": 90.0,
"findings_by_severity": {
"critical": 0,
"high": 2,
"medium": 5,
"low": 12
},
"dimensions": {
"security": 92.0,
"code_quality": 88.0,
"documentation": 85.0
}
},
"compliance": {
"score": 78.0,
"standard": "GOST-56939",
"passed_processes": 20,
"total_processes": 25
},
"release_gate": {
"status": "ready",
"profile": "standard",
"checks_passed": 5,
"checks_total": 6,
"failed_checks": ["sca"]
},
"sca": {
"health": 92.0,
"total_dependencies": 45,
"vulnerable": 3,
"critical_vulnerabilities": 0,
"high_vulnerabilities": 1
},
"generated_at": "2026-03-17T12:00:00Z"
}
codegraph_dashboard_trends¶
Get time-series trend data for dashboard metrics over a configurable period. Returns historical health, audit, and compliance scores for trend visualization.
Parameters:
| Parameter | Type | Default | Description |
|---|---|---|---|
project |
str | "" |
Project name (empty = active project) |
period |
str | "30d" |
Time period: "7d", "30d", "90d", "180d", "365d" |
metrics |
str | "" |
Comma-separated metric names to include (empty = all). Valid: health_score, audit_score, compliance_score, sca_health |
format |
str | "json" |
Output format: "json" or "markdown" |
Response format:
{
"project": "payments-api",
"period": "30d",
"data_points": [
{
"date": "2026-02-15",
"health_score": 70.0,
"audit_score": 75.0,
"compliance_score": 65.0,
"sca_health": 88.0
},
{
"date": "2026-03-17",
"health_score": 85.0,
"audit_score": 90.0,
"compliance_score": 78.0,
"sca_health": 92.0
}
],
"trend_direction": {
"health_score": "improving",
"audit_score": "improving",
"compliance_score": "improving",
"sca_health": "stable"
},
"generated_at": "2026-03-17T12:00:00Z"
}
codegraph_dashboard_compare_periods¶
Compare two adjacent snapshot-backed periods for a project.
Parameters: name (str, required), baseline_period (str: “7d” | “30d” | “90d” | “180d” | “1y”, default “30d”), comparison_period (str: “7d” | “30d” | “90d” | “180d” | “1y”, default “7d”)
codegraph_dashboard_release_compare¶
Compare two release gate runs and attach snapshot deltas where available.
Parameters: name (str, required), from_run_id (str, default “”), to_run_id (str, default “”)
codegraph_dashboard_drilldown¶
Drill down from a project/category aggregate to findings and source locations.
Parameters: name (str, required), category (str, required), limit (int, default 50)
codegraph_dashboard_red_zone¶
Identify projects in the “red zone” – those failing critical thresholds for health, compliance, or security. Returns a prioritized list with reasons and recommended actions.
Parameters:
| Parameter | Type | Default | Description |
|---|---|---|---|
group |
str | "" |
Filter projects by group name (empty = all groups) |
threshold |
float | 50.0 |
Health score threshold below which a project enters the red zone (0.0–100.0) |
format |
str | "json" |
Output format: "json" or "markdown" |
language |
str | "ru" |
Output language: "en" or "ru" |
Response format:
{
"red_zone_count": 2,
"threshold": 50.0,
"projects": [
{
"name": "legacy-auth",
"group": "backend",
"health_score": 35.0,
"reasons": [
"Critical SCA vulnerabilities: 3",
"Compliance score below 40%",
"Release gate: blocked"
],
"recommended_actions": [
"Patch critical CVEs immediately",
"Run compliance evaluation and address gaps",
"Review and fix release gate failures"
],
"days_in_red_zone": 12
}
],
"generated_at": "2026-03-17T12:00:00Z"
}
codegraph_dashboard_compare¶
Compare two or more projects side by side across all dashboard dimensions. Useful for benchmarking teams or tracking relative progress.
Parameters:
| Parameter | Type | Default | Description |
|---|---|---|---|
projects |
str | — | Comma-separated project names (required, minimum 2) |
format |
str | "json" |
Output format: "json" or "markdown" |
language |
str | "ru" |
Output language: "en" or "ru" |
Response format:
{
"comparison": [
{
"project": "payments-api",
"health_score": 85.0,
"audit_score": 90.0,
"compliance_score": 78.0,
"release_status": "ready",
"sca_health": 92.0,
"findings_total": 19,
"critical_findings": 0
},
{
"project": "legacy-auth",
"health_score": 35.0,
"audit_score": 45.0,
"compliance_score": 38.0,
"release_status": "blocked",
"sca_health": 60.0,
"findings_total": 47,
"critical_findings": 3
}
],
"best_in_class": {
"health_score": "payments-api",
"audit_score": "payments-api",
"compliance_score": "payments-api",
"sca_health": "payments-api"
},
"generated_at": "2026-03-17T12:00:00Z"
}
codegraph_dashboard_compliance_heatmap¶
Generate a compliance heatmap showing process-level compliance status across multiple projects. Each cell represents one project’s status for one GOST R 56939 process.
Parameters:
| Parameter | Type | Default | Description |
|---|---|---|---|
group |
str | "" |
Filter projects by group name (empty = all groups) |
standard |
str | "gost-56939" |
Compliance standard: "gost-56939" |
format |
str | "json" |
Output format: "json" or "markdown" |
language |
str | "ru" |
Output language: "en" or "ru" |
Response format:
```json { “standard”: “gost-56939”, “processes”: [“5.1”, “5.2”, “5.3”, “5.4”, “5.5”, “5.6”, “5.7”, “5.8”, “5.9”, “5.10”], “projects”: [ { “name”: “payments-api”, “statuses”: { “5.1”: “compliant”, “5.2”: “compliant”, “5.3”: “partial”, “5.4”: “compliant”, “5.5”: “non_compliant”, “5.6”: “compliant”, “5.7”: “partial”, “5.8”: “compliant”, “5.9”: “compliant”, “5.10”: “partial” }, “overall_score”: 78.0 } ], “legend”: { “compliant”: “All requirements met”, “partial”: “Some requirements met”, “non_compliant”: “Requirements not met”, “not_evaluated”: “Not yet evaluated” }, “generated_at”: “2026-03-17T12:00:00Z” }