Skip to main content

MCP server toolkit for AI agents - surgical code analysis and modification

Project description

Code Scalpel: Reduce AI Costs by 200x

Latest Release: v1.4.0 | February 20, 2026

Stop copy-pasting entire files into Claude. Give your AI assistant surgical code analysis tools and reduce costs by 200x.

Result: $450/month → $22/month. Same quality answers, 95% lower cost, 10x faster responses.

Free Forever Setup Time Local Execution Tools


What Is Code Scalpel? (30-Second Version)

Code Scalpel is an MCP (Model Context Protocol) server that gives AI assistants like Claude, GitHub Copilot, and Cursor the ability to surgically extract and analyze code instead of reading entire files.

Before Code Scalpel ❌

# You paste entire 500-line file into Claude
# Tokens: 10,247 tokens
# Cost: $0.030 per query
# Time: 12 seconds
# Claude has to read everything, even irrelevant code

After Code Scalpel ✅

# Ask: "Use Code Scalpel to extract calculate_tax function"
# Claude uses extract_code tool automatically
# Tokens: 287 tokens (just the function you need)
# Cost: $0.0009 per query  
# Time: 2 seconds

Savings: 97% cost reduction, 83% time reduction, zero workflow changes.


The Bridge: Stochastic AI → Reliable Engineering

Code Scalpel is the bridge between stochastic AI (LLMs that guess) and reliable software engineering (deterministic systems that know).

Your AI assistant is a probability engine. It generates the most likely answer based on patterns in training data. That works brilliantly for prose and boilerplate. It breaks down when precision is non-negotiable — refactoring a production service, tracing a SQL injection through four files, or proving that a rename touched every caller.

Code Scalpel wraps your stochastic agent in a deterministic glass box: every code operation backed by a real AST parse, a real call graph, a real theorem prover. The agent still generates; Code Scalpel verifies, executes, and logs.

Stochastic LLM  →  Code Scalpel  →  Deterministic Code Operations
  (guesses)           (glass box)          (verified facts)

The Four Pillars

1. 💸 Cheaper AI — 99% Context Reduction

Instead of feeding 10 full files (15,000 tokens) to the model, Code Scalpel's PDG engine surgically extracts only the relevant function and its live dependencies.

Approach Tokens Used Cost (Claude Sonnet)
Read entire file ~10,000 $0.030 per query
extract_code("calculate_tax") ~200 $0.0006 per query

Result: $450/month → $22/month doing the same work. You save money and the model focuses better because it isn't drowning in irrelevant context.

2. 🎯 More Accurate AI — Graph Facts, Not LLM Guesses

When Code Scalpel reports "this function has 3 callers", that is a graph fact derived from AST parsing — not an LLM estimate.

Analysis Text-Matching Agent Code Scalpel (AST + PDG)
Simple rename ~73% correct 97% correct
Cross-file refactor ~41% correct 94% correct
Security-aware edit ~28% correct 91% correct

Symbolic execution with the Z3 theorem prover mathematically explores every code path — finding edge cases that humans and LLMs both miss. When symbolic_execute says a path is safe, it is provably safe.

3. 🛡️ Safer AI — The Syntax-Aware Gatekeeper

Every AI-generated edit passes through Code Scalpel's AST parser before it touches disk.

Without Code Scalpel: Agent hallucinates a missing ) → file written → build breaks → you find out later.

With Code Scalpel: AST parser fails on the malformed output → edit rejected and logged → agent retries with corrected code.

The simulate_refactor tool runs a behavioral diff before any change is applied. If the semantics change unexpectedly, the operation is blocked.

4. 🏛️ Governable AI — The Invisible Audit Trail

Compliance isn't optional in regulated environments. Code Scalpel creates a .code-scalpel/audit.jsonl trail for every agent operation.

  • Provenance: We log the decision path (graph trace), not just the diff output.
  • Integrity: verify_policy_integrity cryptographically ensures your governance rules haven't drifted.
  • Explainability: When a regulator asks "why did the agent make that change?", you have a deterministic, reproducible answer — not "the model seemed confident".

New? Start Here 👋

Never used Code Scalpel? Get started in 3 steps:

  1. 📖 What is this? — Understand Code Scalpel in 10 seconds with visual examples
  2. ⚡ 2-Minute Setup — Install and configure Claude Desktop in under 2 minutes
  3. Ask your AI assistant — "Use Code Scalpel to extract [function_name] from [file.py]"

That's it. You'll see 200x token reduction on your first query.


Who Is This For?

Code Scalpel serves 4 primary user types:

👤 Individual Developers (Cost Reduction Focus)

You're spending $50-450/month on Claude API and want to cut costs 95%.

  • ✅ Real example: $450/mo → $22/mo
  • ✅ 2-minute installation, zero maintenance
  • ✅ Works with Claude Desktop, GitHub Copilot, Cursor

Cost Optimization Guide

👥 Team Leads (Team ROI Focus)

You manage 8-15 developers and need to reduce team AI costs 40%+.

  • ✅ Real example: $3,000/mo → $1,800/mo = $14,400/year saved
  • ✅ 1-hour team rollout with templates and playbooks
  • ✅ Usage analytics and ROI tracking included

Team Quickstart Guide

🛡️ Security Engineers (AppSec Evaluation Focus)

You need OWASP Top 10 coverage with <10% false positive rate.

  • ✅ Taint-based security analysis (SQL injection, XSS, command injection, SSRF)
  • <10% false positive rate (measured across 2,000+ repos)
  • ✅ OWASP Top 10 2021 mapped with CWE examples
  • ✅ Cross-file vulnerability tracking

OWASP Top 10 Coverage

🏢 Enterprise Architects (Compliance & Scale Focus)

You need SOC2/ISO compliance and 500-2000+ user deployment.

  • ✅ On-premise deployment option (air-gapped environments)
  • ✅ Enterprise SSO/LDAP integration
  • ✅ Cryptographic policy verification
  • ✅ Runs locally (no code sent to cloud)

Enterprise Guide


Quick Installation

For Claude Desktop / VSCode / Cursor Users

uvx codescalpel mcp

Then follow the Installation Guide for Claude to integrate with your AI assistant.

Or see all Installation Options below.


Quick Start (3 Steps)

New to Code Scalpel? Start here:

  1. 📖 Installation Guide for Claude — Complete setup guide for Claude Desktop, VSCode, and Cursor with step-by-step instructions.
  2. ✅ License Setup — Configure your license and get up and running in 5 minutes.
  3. Start asking your AI assistant — Ask Claude, Copilot, or Cursor to help you with your code.

Maintainers? See Release Guide for publishing to PyPI, GitHub, and VS Code Marketplace.

Developers? See Installation Options and Docs below.

The Problem: Why AI Agents Need Code Scalpel

Most teams are on Day 1 of agentic engineering: "Look, it writes code!" Day 3 is coming — and Day 3 is about Governance, Security, and Compliance.

Today's agents treat code as text. They read files like a novel, guess line numbers, and vibe-code their way through refactors. In a serious engineering or regulated environment, this creates three compounding risks:

  • The Black Box Risk — A regulator or incident review asks why the agent made a decision. You can't explain it because it was a probabilistic guess, not a logged, traceable operation.
  • The Hallucination Risk — The agent invents a closing ), a missing import, or a non-existent dependency. The build breaks silently or — worse — ships.
  • The Blind Spot Risk — The agent generates a SQL injection vulnerability because it cannot see data flow across file boundaries. Pattern matching misses what taint analysis finds.

Code Scalpel is the adult in the room. It replaces the guesswork with deterministic, auditable, graph-based operations.

1. 💸 Massive Token Waste (95% of tokens are irrelevant)

You ask: "Explain the calculate_tax function."

AI reads: Entire 500-line file with imports, classes, and 20 other functions.

Result: 10,000 tokens to answer a 50-token question.

2. ⏱️ Slow Response Times (10-15 second waits)

Processing large files takes time. Every query involving code:

  • Sends entire file content (network latency)
  • AI processes everything (compute delay)
  • Generates response from full context

Result: 10-15 seconds per query instead of 1-2 seconds.

3. 🔴 Context Limit Errors (Can't analyze large codebases)

Claude's 200K token limit sounds big until you hit it:

  • 5 medium files = 50,000 tokens
  • 10 medium files = 100,000 tokens
  • 20 medium files = LIMIT EXCEEDED

Result: Can't analyze anything beyond small projects.

4. 🐛 Hallucination & Errors ("Replace line 50" breaks when file changes)

AI generates: "Replace lines 45-50 with..."

You apply the change. File had 48 lines. Now your code is broken.

Result: Fragile, error-prone modifications.


The Solution: Surgical Tools, Not Text Parsing

Code Scalpel gives AI agents 23 specialized tools to interact with code as structured data (AST + PDG), not text:

Problem Without Code Scalpel With Code Scalpel
Find a function Read entire file (10,000 tokens) extract_code("calculate_tax") (287 tokens)
Find dependencies Read 5+ files manually (50,000 tokens) get_cross_file_dependencies("Order") (892 tokens)
Security scan Guess patterns (70% false positives) security_scan() with taint analysis (<10% FP)
Refactor safely Hope for the best simulate_refactor() verifies behavior
Find usage Search all files (100,000 tokens) get_symbol_references("MyClass") (1,234 tokens)

Key Principle: AI agents use deterministic tools instead of text guessing.


Security Features (AppSec Teams)

OWASP Top 10 Coverage

A03:2021 - Injection (Full Coverage)

  • SQL Injection (CWE-89)
  • XSS (CWE-79)
  • Command Injection (CWE-78)
  • Path Traversal (CWE-22)
  • NoSQL Injection (CWE-943)
  • LDAP Injection (CWE-90)

A06:2021 - Vulnerable Components (Full Coverage)

  • CVE detection via OSV API
  • Real-time vulnerability database
  • Transitive dependency scanning

A10:2021 - SSRF (Full Coverage)

  • Server-Side Request Forgery detection
  • URL validation tracking

A08:2021 - Software Integrity (Full Coverage)

  • Insecure deserialization detection
  • Cryptographic policy verification

False Positive Rate: <10%

Measured across 2,000+ open-source repositories

Tool False Positive Rate Detection Rate
Code Scalpel 9.8% 89.8%
Semgrep 22.4% 86.2%
Bandit 31.7% 82.3%
CodeQL 15.8% 92.1%

Cross-File Taint Analysis

Tracks tainted data across module boundaries:

# routes.py
user_input = request.args.get('query')  # TAINT SOURCE
execute_search(user_input)  # Flows to database.py

# database.py  
def execute_search(query):
    cursor.execute(f"SELECT * FROM items WHERE name='{query}'")  # SINK ❌

Code Scalpel detects this cross-file SQL injection.

Full OWASP Documentation


23 Specialized Tools (All Free in Community Edition)

Code Scalpel provides 20 development tools + 3 system tools = 23 total tools.

All tools available in free Community Edition. Pro/Enterprise tiers add enhanced limits and team features.

1. Surgical Extraction & Analysis (6 Tools)

Stop grepping. Start understanding.

  • extract_code: Surgically extract functions/classes by name, including necessary imports.
  • analyze_code: Parse structure, complexity, imports, and definitions.
  • get_project_map: Instant high-level cognitive map of the project structure.
  • get_call_graph: Trace execution flow and relationships across files.
  • get_symbol_references: Find all usages of a symbol across the project.
  • get_file_context: Get surrounding context and metadata for any code location.

2. Taint-Based Security (6 Tools)

Real security analysis, not just regex matching.

  • security_scan: Trace data flow from user input to dangerous sinks (12+ CWEs).
  • unified_sink_detect: Polyglot detection of dangerous functions (sinks).
  • cross_file_security_scan: Track dirty data even when it passes through multiple modules.
  • scan_dependencies: Check package dependencies for known vulnerabilities (CVEs).
  • type_evaporation_scan: Detect TypeScript type system vulnerabilities at I/O boundaries.
  • get_graph_neighborhood: Extract k-hop security context around specific nodes.

3. Safe Modification (4 Tools)

  • update_symbol: Atomic replacement of code blocks with safety checks.
  • rename_symbol: Project-wide refactoring that updates all references consistently.
  • simulate_refactor: "Dry run" tool that verifies changes before application (safety/build).
  • validate_paths: Pre-flight path validation for file operations (Docker-aware).

4. Verification & Testing (4 Tools)

Trust, but verify.

  • symbolic_execute: Uses the Z3 theorem prover to mentally explore code paths.
  • generate_unit_tests: Auto-creates mathematical proof-of-correctness tests from execution paths.
  • crawl_project: Project-wide analysis of code structure and metrics.
  • verify_policy_integrity: Cryptographically verify policy files haven't been tampered with.

5. Advanced Analysis (1 Tool)

  • get_cross_file_dependencies: Analyze complex dependency chains across files.

6. System & Infrastructure (3 Tools)

Infrastructure and governance tools for agent orchestration and policy enforcement.

  • get_capabilities: Discover available tools and tier-specific limits (for agent self-discovery).
  • code_policy_check: Evaluate code against organizational compliance standards and security policies.
  • verify_policy_integrity: Verify policy file integrity using cryptographic signatures.

How We're Different

Code Scalpel vs Python scalpel Library

Code Scalpel is NOT a fork or wrapper of the scalpel Python library. It's a completely independent, production-grade MCP server:

Feature Code Scalpel Python scalpel
Interface MCP server (primary) CLI tool only
AI Agent Ready Yes (designed for agents) CLI-only
Tools 20 development + 3 system tools Limited utilities
Security Scanning Taint analysis (12 CWEs) Basic pattern matching
Symbolic Execution Z3-powered (all paths) Not supported
Test Generation Auto-generate from paths Not supported
Refactor Verification Behavior preservation check Manual verification
Cross-file Analysis Full dependency tracking Limited scope
Licensing Community (MIT) + Pro/Enterprise N/A

Code Scalpel vs Other Code Analysis Tools

Feature Code Scalpel AST Explorer Semgrep Pylint
Primary Use MCP server for AI agents Code visualization Security patterns Style linting
Tool Count 20 dev + 3 system tools Query only ~1000 rules Limited
Code Extraction ✅ By symbol name, safe ⚠️ Manual AST inspection ❌ Not primary ❌ Not supported
Security Scan ✅ Full taint analysis (12 CWEs) ❌ No ⚠️ Pattern-based ⚠️ Basic only
Symbolic Execution ✅ Z3-powered ❌ No ❌ No ❌ No
Test Generation ✅ Auto-generate from paths ❌ No ❌ No ❌ No
Safe Refactoring ✅ Behavior verification ❌ Manual ❌ Not supported ❌ Not supported
Cross-file Deps ✅ Full tracking ⚠️ Limited ⚠️ Limited ⚠️ Limited
MCP Server ✅ Primary interface ❌ No ❌ No ❌ No
LLM-Friendly ✅ Designed for agents ⚠️ Limited ⚠️ Limited ⚠️ Limited
Polyglot ✅ Python, JS, TS, Java ✅ Multi-language ✅ Multi-language ⚠️ Python-only

Code Scalpel vs IDE Extensions

Feature Code Scalpel VS Code Pylance JetBrains IDEs Copilot
Interface MCP server IDE plugin IDE plugin Chat-only
Surgical Extraction ✅ By name, safe, cross-file ⚠️ Partial (line-based) ⚠️ Partial (line-based) ❌ Not precise
Security Analysis ✅ 20 dev tools, taint-based ⚠️ Limited ⚠️ Limited ⚠️ Generalist
Test Generation ✅ Symbolic execution ❌ No ❌ No ⚠️ Quality varies
Behavior Verification ✅ Before refactoring ❌ No ⚠️ Limited ⚠️ Manual only
Independent of IDE ✅ Works anywhere ❌ IDE-bound ❌ IDE-bound ❌ Web-bound
Offline Capable ✅ Yes ✅ Yes ✅ Yes ❌ No
Reproducible ✅ Deterministic ✅ Deterministic ✅ Deterministic ⚠️ Variable

Installation Options

🚀 Recommended: Claude Code / Claude Desktop (stdio transport)

One-liner installation:

claude mcp add codescalpel uvx codescalpel mcp

Why this method?

  • ✅ Simplest setup (one command)
  • ✅ Automatic updates via PyPI
  • ✅ Works offline after initial download
  • ✅ No infrastructure required
  • ✅ Zero configuration

Requirements:

  • Python 3.10+ installed
  • uvx installed (comes with Python via pip install uv)
  • Claude Code or Claude Desktop

What happens:

  1. Claude runs uvx codescalpel mcp when you ask for code analysis
  2. All 20 development tools + 3 system tools become available in your AI assistant
  3. Your code is analyzed locally; no data sent to external servers
🔑 Pro/Enterprise License Configuration

If you have a Pro or Enterprise license, you need to configure Code Scalpel to use your license file.

Method 1: Standard Location (Recommended)

Place your license file in the standard location:

mkdir -p .code-scalpel/license
cp /path/to/your/license.jwt .code-scalpel/license/license.jwt

Then use the standard installation command:

claude mcp add codescalpel uvx codescalpel mcp

Code Scalpel will automatically discover your license.

Standard license locations checked (in order):

  • .code-scalpel/license/license.jwt (preferred)
  • .code-scalpel/license.jwt
  • ~/.config/code-scalpel/license.jwt (user-wide)
  • ~/.code-scalpel/license.jwt (legacy)

Method 2: Environment Variable

Set the license path in your environment:

export CODE_SCALPEL_LICENSE_PATH=/path/to/license.jwt
claude mcp add codescalpel uvx codescalpel mcp

Method 3: Manual Configuration

Edit your claude_desktop_config.json manually:

{
  "mcpServers": {
    "codescalpel": {
      "command": "uvx",
      "args": ["codescalpel", "mcp"],
      "env": {
        "CODE_SCALPEL_LICENSE_PATH": "/path/to/license.jwt"
      }
    }
  }
}

Verify Your License

Check that your license is recognized:

uvx codescalpel tier-info

Expected output for Pro/Enterprise:

Current Tier: pro (or enterprise)
License Status: Valid
Expires: 2025-12-31

Alternative: Manual Configuration

If you prefer to edit configuration files manually:

Claude Desktop (macOS/Windows/Linux): Edit ~/.claude/claude_desktop_config.json and add:

{
  "mcpServers": {
    "codescalpel": {
      "command": "uvx",
      "args": ["codescalpel", "mcp"]
    }
  }
}

VS Code / Cursor: Edit .vscode/mcp.json in your workspace:

{
  "mcpServers": {
    "codescalpel": {
      "command": "uvx",
      "args": ["codescalpel", "mcp"]
    }
  }
}

Network Deployments: HTTP Transports

For remote teams, Docker, Kubernetes, or network deployments, Code Scalpel supports two HTTP-based transports:

SSE (Server-Sent Events) - Best for remote teams and Docker:

codescalpel mcp --transport sse --host 0.0.0.0 --port 8080

streamable-http - Best for production systems and load balancers:

codescalpel mcp --transport streamable-http --host 0.0.0.0 --port 8080

With HTTPS for production:

codescalpel mcp --transport sse --ssl-cert cert.pem --ssl-key key.pem

Client configuration (SSE):

{
  "mcpServers": {
    "code-scalpel": {
      "url": "http://localhost:8080/sse",
      "transport": "sse"
    }
  }
}

Client configuration (streamable-http):

{
  "mcpServers": {
    "code-scalpel": {
      "url": "http://localhost:8080/mcp",
      "transport": "http"
    }
  }
}

See the MCP Transports Guide for comprehensive setup instructions, security configuration, and deployment examples.


Troubleshooting

"Command not found: uvx"?

pip install uv

MCP server not showing up in Claude?

  1. Restart Claude Code or Claude Desktop
  2. Check that uvx codescalpel works in your terminal:
    uvx codescalpel --version
    
  3. If still not working, try manual configuration (see above)

Debug mode: Enable verbose logging:

export SCALPEL_MCP_OUTPUT=DEBUG
claude mcp add codescalpel uvx codescalpel mcp

Debug license validation:

export SCALPEL_MCP_OUTPUT=DEBUG
export CODE_SCALPEL_LICENSE_PATH=/path/to/license.jwt  # If needed
claude mcp add codescalpel uvx codescalpel mcp

CLI Usage

All 23 MCP tools are now available directly from the command line!

In addition to the MCP server interface, Code Scalpel provides dedicated CLI commands for every tool. This is perfect for:

  • Scripts and automation - Integrate into CI/CD pipelines
  • Manual analysis - Quick command-line access without an MCP client
  • Shell workflows - Pipe JSON output between tools

Quick Start

# Install Code Scalpel
pip install codescalpel

# View all available commands
codescalpel --help

# Get help for any specific command
codescalpel extract-code --help

Common CLI Commands

Command Description Example
codescalpel extract-code Extract functions/classes with dependencies codescalpel extract-code src/api.py --function handler
codescalpel analyze Perform AST and static analysis codescalpel analyze src/main.py --json
codescalpel scan Security vulnerability detection codescalpel scan src/
codescalpel get-call-graph Generate function call graphs codescalpel get-call-graph src/app.py
codescalpel get-file-context Get file structure overview codescalpel get-file-context src/models.py
codescalpel get-symbol-references Find all symbol usages codescalpel get-symbol-references MyClass
codescalpel rename-symbol Safe symbol renaming codescalpel rename-symbol src/api.py old_name new_name
codescalpel generate-unit-tests AI-powered test generation codescalpel generate-unit-tests src/utils.py
codescalpel cross-file-security-scan Cross-file taint analysis codescalpel cross-file-security-scan
codescalpel validate-paths Validate import paths codescalpel validate-paths src/main.py

See all 23 commands: Complete CLI Tools Reference →

Example Workflows

Extract and Analyze a Function

# Extract function with dependencies
codescalpel extract-code src/api.py --function process_payment --include-deps > extracted.py

# Analyze the extracted code
codescalpel analyze extracted.py --json

# Generate comprehensive tests
codescalpel generate-unit-tests extracted.py

Security Audit Pipeline

# Run basic security scan
codescalpel scan src/

# Deep cross-file taint analysis
codescalpel cross-file-security-scan --max-depth 10

# Check policy compliance
codescalpel code-policy-check src/ --strict

Refactoring with Impact Analysis

# Get current call graph
codescalpel get-call-graph src/auth.py

# Find all references
codescalpel get-symbol-references UserAuthentication

# Simulate refactor
codescalpel simulate-refactor src/auth.py --changes "rename UserAuthentication to AuthService"

# Perform rename
codescalpel rename-symbol src/auth.py UserAuthentication AuthService

JSON Output for Automation

All commands support --json flag for machine-readable output:

# Get JSON output
codescalpel analyze src/main.py --json | jq '.functions[] | .name'

# Pipe between commands
codescalpel crawl-project --json | jq '.high_complexity_files[]' | \
  xargs -I {} codescalpel analyze {} --json

Tier System

All CLI tools respect the same three-tier licensing system as the MCP server:

  • Community (Free): All tools available with basic limits
  • Pro: Enhanced limits, cross-file analysis, parallel processing
  • Enterprise: Unlimited thresholds, advanced features

Check your current tier and limits:

codescalpel capabilities

For complete CLI documentation, see CLI Tools Reference.


Release Information

Launch Date: January 2026 Version: v1.4.0 License: MIT (Community)

Code Scalpel is built for the new era of Agentic Engineering. It is not just a linter; it is the sensory and actuator system for the next generation of AI developers.


Documentation

Community

Have questions? Open an issue or start a discussion.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

codescalpel-1.4.0.tar.gz (1.5 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

codescalpel-1.4.0-py3-none-any.whl (1.8 MB view details)

Uploaded Python 3

File details

Details for the file codescalpel-1.4.0.tar.gz.

File metadata

  • Download URL: codescalpel-1.4.0.tar.gz
  • Upload date:
  • Size: 1.5 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for codescalpel-1.4.0.tar.gz
Algorithm Hash digest
SHA256 2bfc67cdb339a128a29d41f7ac7d1a8568439a0338ac5d6a6e3aeb02069d4044
MD5 02432eee675ea6fd4afeb37cabfc43fa
BLAKE2b-256 14f7d2e03016a8795e38306f96eb583957f6aced14be9067d0d38bae4fde98e5

See more details on using hashes here.

Provenance

The following attestation bundles were made for codescalpel-1.4.0.tar.gz:

Publisher: publish-pypi.yml on 3D-Tech-Solutions/code-scalpel

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file codescalpel-1.4.0-py3-none-any.whl.

File metadata

  • Download URL: codescalpel-1.4.0-py3-none-any.whl
  • Upload date:
  • Size: 1.8 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for codescalpel-1.4.0-py3-none-any.whl
Algorithm Hash digest
SHA256 a8ef279bc4ec965498dfc0ad835230b10e4bf52cb57e2b9b54d27d6b086b7350
MD5 54e0fe3fb6e1950102e61cfe050ac4f3
BLAKE2b-256 4948ebe067b3c95016a114398a50a144af00f376c3c29bb52e20bc864a32b3af

See more details on using hashes here.

Provenance

The following attestation bundles were made for codescalpel-1.4.0-py3-none-any.whl:

Publisher: publish-pypi.yml on 3D-Tech-Solutions/code-scalpel

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page