# Code Sentinel

Expose security vulnerabilities, deceptive constructs, and unfinished code before they reach production. Reveal architectural and design pattern usage with clear, actionable guidance to improve consi…

## Quick Start

```bash
# Connect this server (installs CLI if needed)
npx -y @smithery/cli@latest mcp add salrad/code-sentinel

# Browse available tools
npx -y @smithery/cli@latest tool list salrad/code-sentinel

# Get full schema for a tool
npx -y @smithery/cli@latest tool get salrad/code-sentinel analyze_code

# Call a tool
npx -y @smithery/cli@latest tool call salrad/code-sentinel analyze_code '{}'
```

## Direct MCP Connection

Endpoint: `https://code-sentinel--salrad.run.tools`

## Tools (7)

- `analyze_code` — Analyze code for security issues, errors, deceptive patterns, and placeholders. Returns a structured analysis with issu…
- `generate_report` — Analyze code and generate a detailed HTML report with visual indicators for issues and strengths.
- `check_security` — Check code for security vulnerabilities only (hardcoded secrets, SQL injection, XSS, etc.)
- `check_deceptive_patterns` — Check for code patterns that hide errors or create false confidence (empty catches, silent failures, etc.)
- `check_placeholders` — Check for placeholder code, dummy data, TODO/FIXME comments, and incomplete implementations
- `analyze_patterns` — Analyze code for architectural, design, and implementation patterns. Detects pattern usage, inconsistencies, and provid…
- `analyze_design_patterns` — Focused analysis of Gang of Four (GoF) design patterns in code. Detects Singleton, Factory, Observer, Strategy, and oth…

```bash
# Get full input/output schema for a tool
npx -y @smithery/cli@latest tool get salrad/code-sentinel <tool-name>
```
