Local Java code intelligence indexer backed by a graph database
Project description
CodeSpine
CodeSpine cuts token burn for coding agents working on Java codebases.
Instead of having an agent open dozens of .java files to answer one question, CodeSpine indexes the codebase once and serves the structure over MCP. The agent asks for symbols, callers, impact, flows, dead code, and module boundaries directly, which means fewer file reads, fewer wasted context windows, and fewer hallucinated code paths.
It indexes classes, methods, calls, type relationships, cross-module links, git coupling, dead-code candidates, and execution flows so agents can work from graph answers first and source files second.
It also keeps a separate dirty overlay for uncommitted Java edits, so agents can query current work-in-progress without forcing the committed base index to churn on every save.
The MCP daemon and the indexer run independently. Querying while a full re-index is running no longer causes crashes or memory contention — reads go to an isolated snapshot that is atomically updated when indexing completes.
Why It Saves Tokens
- One MCP call can replace many file opens.
get_symbol_context("PaymentService")returns a resolved neighborhood instead of forcing the agent to read every caller and callee file manually. - Search is structure-aware. Agents can ask for a symbol, concept, impact radius, or dead-code candidate without scanning entire packages.
- Multi-module repos stay scoped. Project-aware IDs and
project=parameters reduce noise from unrelated modules and workspaces. - Repeat sessions get cheaper. Once indexed, the agent reuses the graph instead of re-discovering the same relationships every turn.
- Active edits stay smooth. Dirty files are kept in an overlay and merged into fast queries until you commit, instead of hammering the main graph DB on each change.
Install
pip install codespine
Optional semantic search:
pip install "codespine[ml]"
What It Does
- Hybrid search: BM25 + fuzzy by default, semantic vector search with
--embed - Impact analysis: callers, dependencies, and confidence-scored edges
- Dead code detection: Java-aware exemptions for tests, framework hooks, contracts, and common DI patterns
- Execution flows: traces from entry points through the call graph
- Community detection: structural clusters for architectural context
- Change coupling: git-history-based file relationships
- Multi-project and multi-module indexing: workspaces, Maven modules, Gradle subprojects
- Cross-module call linking: signature-based detection of calls between Maven/Gradle modules
- Concurrent read/write isolation: MCP queries run against a read replica; the indexer writes separately, with no memory contention
- MCP server: structured tools for Claude, Cursor, Cline, Copilot, and similar clients
Editing Without Stale Indexes
CodeSpine uses a two-layer model:
- Base index: last committed state
- Dirty overlay: uncommitted Java changes
Fast tools read merged base + overlay state by default:
searchcontextimpact- MCP
search_hybrid - MCP
find_symbol - MCP
get_symbol_context - MCP
get_impact
Deep analyses stay committed-only until promotion:
deadcodeflowcommunitycoupling
codespine watch updates the dirty overlay after a debounce window, then promotes it into the base index when local HEAD changes.
Quick Start
Index a repo:
codespine analyse /path/to/project
Run a deeper pass:
codespine analyse /path/to/project --deep
Add embeddings for semantic search:
codespine analyse /path/to/project --embed
Typical output:
$ codespine analyse .
Walking files... 142 files found
Index mode... incremental (8 files to index, 0 deleted)
Parsing code... 8/8
Tracing calls... 847 calls resolved
Analyzing types... 234 type relationships
Cross-module linking... skipped (single module)
Detecting communities... loading symbols
Detecting communities... 623 symbols, 1204 structural edges
Detecting communities... persisting 8/8 clusters
Detecting communities... 8 clusters found
Detecting execution flows... 34 entry points, tracing
Detecting execution flows... 34 processes found
Finding dead code... 12 unreachable symbols
Analyzing git history... 18 commits, computing co-changes
Analyzing git history... 18 coupled file pairs
Generating embeddings... 0 vectors stored
Done in 4.2s - 623 symbols, 1847 edges, 8 clusters, 34 flows (no embeddings; rerun with --embed for semantic search)
Publishing read replica... MCP will reload automatically
Each analysis phase streams live progress in place. The final step publishes a read replica so the MCP daemon picks up the new index without restarting.
Search the index:
codespine search "retry payment"
codespine context "PaymentService"
codespine impact "com.example.PaymentService#charge(java.lang.String)"
codespine stats
MCP
Foreground MCP server:
codespine mcp
Minimal MCP config:
{
"mcpServers": {
"codespine": {
"command": "codespine",
"args": ["mcp"]
}
}
}
If the client launches the wrong Python environment, use the absolute binary path instead:
{
"mcpServers": {
"codespine": {
"command": "/absolute/path/to/codespine",
"args": ["mcp"]
}
}
}
Common MCP tools:
search_hybrid(query, k, project)find_symbol(name, kind, project, limit)get_symbol_context(query, max_depth, project)get_impact(symbol, max_depth, project)detect_dead_code(limit, project, strict)trace_execution_flows(entry_symbol, max_depth, project)get_symbol_community(symbol)get_change_coupling(months, min_strength, min_cochanges, project)compare_branches(base_ref, head_ref)get_codebase_stats()
CLI
Core commands:
codespine analyse <path>
codespine analyse <path> --full
codespine analyse <path> --deep
codespine analyse <path> --embed
codespine watch --path .
codespine watch --path . --overlay-debounce-ms 1500
codespine search "query"
codespine context "symbol"
codespine impact "symbol"
codespine deadcode
codespine flow
codespine community
codespine coupling
codespine diff main..feature
codespine stats
codespine list
codespine overlay-status
codespine overlay-promote
codespine overlay-clear
codespine clear-project <project_id>
codespine clear-index
analyse defaults to incremental mode. Repeat runs are designed to be fast when files have not changed.
Workspace And Module Detection
CodeSpine can index:
- a single Java repo
- a multi-module Maven or Gradle repo
- a workspace directory containing multiple repos
Project IDs are:
- single-module repo:
payments-service - multi-module repo:
payments-service::core,payments-service::api
That same project ID can be passed into MCP tools and CLI analysis calls that support project scoping.
Deep Analysis Trade-Offs
--deep enables the expensive graph-wide passes:
- communities
- execution flows
- dead code
- git coupling
Use it when you want architecture-level context. Skip it when you just need the graph refreshed for search, context, and impact.
When a dirty overlay exists, deep-analysis results intentionally exclude those uncommitted edits until promotion.
--embed is also optional. Without it, CodeSpine still supports exact, keyword, and fuzzy search. Add embeddings when you need concept-level retrieval.
Concurrent Indexing and Querying
The indexer (write) and the MCP daemon (read) use separate database paths:
- The indexer writes to
~/.codespine_dbwith a 512 MB buffer pool. - When indexing completes,
analyseatomically copies the database to~/.codespine_db_readand touches a sentinel file. - The MCP daemon and all read-only CLI commands open
~/.codespine_db_readwith a 128 MB buffer pool. - The MCP daemon watches the sentinel file and silently reloads from the new snapshot on the next tool call — no restart needed.
Running codespine analyse --deep --embed on one project while querying a different one no longer causes buffer pool OOM or lock contention.
Runtime Files
~/.codespine_db- graph database (write)~/.codespine_db_read- read replica used by MCP and CLI queries~/.codespine_db_read.updated- sentinel file; touched after each successful snapshot~/.codespine.pid- MCP background server PID~/.codespine.log- server log~/.codespine_embedding_cache.json- embedding cache~/.codespine_index_meta/- incremental file metadata cache~/.codespine_overlay/- uncommitted dirty overlay state
Notes
codespine startlaunches a background MCP server. Most IDE MCP clients should usecodespine mcpinstead and manage the process themselves.codespine watchupdates the dirty overlay first; it does not rewrite the committed base index on every save.codespine clear-indexrebuilds the local index database from scratch. This also removes the read replica; runanalyseagain to republish it.- For large Spring or JPA-heavy repos, dead-code results should still be reviewed before deletion. The tool is conservative, not authoritative.
- The first run after upgrading to v0.5.7 will not have a read replica yet. Run
codespine analyseonce to create it.
Project Docs
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file codespine-0.7.0.tar.gz.
File metadata
- Download URL: codespine-0.7.0.tar.gz
- Upload date:
- Size: 90.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
4f2ae2946164d3fe01d6013849f7e8caccf3a90e0d7d9377fc07fb5f4daac3ad
|
|
| MD5 |
7e9b680396eb7db5bd51deb707f8133f
|
|
| BLAKE2b-256 |
8ce04312a0e2dd7500ea5335335ef9e1975b4504ac3c992be678b292e8d102ce
|
Provenance
The following attestation bundles were made for codespine-0.7.0.tar.gz:
Publisher:
publish-pypi.yml on vinayak3022/codeSpine
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
codespine-0.7.0.tar.gz -
Subject digest:
4f2ae2946164d3fe01d6013849f7e8caccf3a90e0d7d9377fc07fb5f4daac3ad - Sigstore transparency entry: 1114672233
- Sigstore integration time:
-
Permalink:
vinayak3022/codeSpine@7edb849ad7364ca54f1f052ac28b2b917f29d67c -
Branch / Tag:
refs/tags/v0.7.0 - Owner: https://github.com/vinayak3022
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish-pypi.yml@7edb849ad7364ca54f1f052ac28b2b917f29d67c -
Trigger Event:
push
-
Statement type:
File details
Details for the file codespine-0.7.0-py3-none-any.whl.
File metadata
- Download URL: codespine-0.7.0-py3-none-any.whl
- Upload date:
- Size: 94.2 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
539a3787b4596e299ff59abf5022004979196388436159da986b9dd78473dc5e
|
|
| MD5 |
99b749307a4b28eea670b3ae827972ef
|
|
| BLAKE2b-256 |
643cf57eeb0f10dda8b2c1e20619ad7a240fd5b8f7b543590b84a13c85a0b87b
|
Provenance
The following attestation bundles were made for codespine-0.7.0-py3-none-any.whl:
Publisher:
publish-pypi.yml on vinayak3022/codeSpine
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
codespine-0.7.0-py3-none-any.whl -
Subject digest:
539a3787b4596e299ff59abf5022004979196388436159da986b9dd78473dc5e - Sigstore transparency entry: 1114672246
- Sigstore integration time:
-
Permalink:
vinayak3022/codeSpine@7edb849ad7364ca54f1f052ac28b2b917f29d67c -
Branch / Tag:
refs/tags/v0.7.0 - Owner: https://github.com/vinayak3022
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish-pypi.yml@7edb849ad7364ca54f1f052ac28b2b917f29d67c -
Trigger Event:
push
-
Statement type: