Workspace-confined coding tools exposed as an MCP server.
Project description
Coding Tools MCP
Coding Tools MCP is a model-neutral coding-agent runtime MCP server. It exposes local coding primitives to any MCP client:
inspect repo -> search/read files -> apply structured patches -> run tests/commands
-> interact with stdin sessions -> inspect git status/diff
It is not a prompt wrapper. It does not expose external agent accounts, memory, cloud tasks, web search, image generation, model routing, plugin marketplace, or subagent orchestration as MCP tools.
Documentation Map
- Quickstart
- MCP client configuration
- Remote MCP
- Tools and schemas
- Security policy
- CI and test commands
- Dogfood
- SWE-bench evaluation
- Known limitations
- Troubleshooting
- Competitive analysis
- Normative MCP runtime profile: docs/profile-v0.1.md
Quickstart
Install the published command from PyPI:
curl -fsSL https://raw.githubusercontent.com/xyTom/coding-tools-mcp/main/scripts/install.sh | bash
Install and start local Streamable HTTP against a workspace:
curl -fsSL https://raw.githubusercontent.com/xyTom/coding-tools-mcp/main/scripts/install.sh \
| bash -s -- --start --workspace /path/to/repo
Install and expose a read-only bearer-token tunnel:
curl -fsSL https://raw.githubusercontent.com/xyTom/coding-tools-mcp/main/scripts/install.sh \
| bash -s -- --tunnel cloudflared --auto-install-tunnel --workspace /path/to/repo
Or, from this checkout:
scripts/install.sh
Run the published package without a persistent install:
uvx coding-tools-mcp --workspace .
Use stdio for MCP clients:
uvx coding-tools-mcp --stdio --workspace /path/to/repo
If you are working from this checkout instead of a published package:
cd /root/coding-tools-mcp
python -m pip install -e ".[dev]"
coding-tools-mcp --workspace /path/to/repo --host 127.0.0.1 --port 8765
Install the optional image extra when you want view_image auto-resize support:
python -m pip install -e ".[image]"
HTTP endpoint:
http://127.0.0.1:8765/mcp
Stdio:
coding-tools-mcp --stdio --workspace /path/to/repo
Set CODING_TOOLS_MCP_TRACE=1 to emit redacted JSON tool-call trace events to stderr for local debugging. Logs stay off stdout so stdio JSON-RPC remains clean.
If your MCP client does not support permission elicitation and you explicitly want permission-gated operations to run, start with:
coding-tools-mcp --dangerously-skip-all-permissions --workspace /path/to/repo
This auto-grants permission-gated operations such as network-looking commands, destructive commands, shell expansion, and sensitive env passed through exec_command. Workspace path boundaries still apply.
MCP Client Examples
Generic stdio client:
[mcp_servers.coding_tools]
command = "uvx"
args = ["coding-tools-mcp", "--stdio", "--workspace", "/path/to/repo"]
Claude Code:
{
"mcpServers": {
"coding-tools": {
"command": "uvx",
"args": ["coding-tools-mcp", "--stdio", "--workspace", "/path/to/repo"]
}
}
}
Cursor:
{
"mcpServers": {
"coding-tools": {
"command": "uvx",
"args": ["coding-tools-mcp", "--stdio", "--workspace", "/path/to/repo"]
}
}
}
Generic Streamable HTTP clients should use MCP protocol version 2025-06-18 and point at http://127.0.0.1:8765/mcp.
Remote MCP
For remote MCP clients and local development over an HTTPS tunnel, keep the server bound to loopback and expose the tunnel URL with the safest profile your client can use. Anonymous tunnel testing should use read-only mode:
CODING_TOOLS_MCP_AUTH_MODE=noauth \
CODING_TOOLS_MCP_TOOL_PROFILE=read-only \
./scripts/tunnel.sh cloudflared /path/to/repo
Configure the remote MCP client with the HTTPS tunnel URL:
URL: https://<tunnel-host>/mcp
The tunnel scripts support cloudflared, ngrok, and Microsoft Dev Tunnel. If the selected tunnel CLI is missing, the script asks before installing it:
scripts/tunnel.sh cloudflared /path/to/repo
scripts/tunnel.sh ngrok /path/to/repo
scripts/tunnel.sh devtunnel /path/to/repo
For clients that support custom headers, use bearer-token auth with Authorization: Bearer <token>. For MCP clients that speak OAuth 2.1 Authorization Code + PKCE, use CODING_TOOLS_MCP_AUTH_MODE=oauth with scripts/tunnel.sh (or scripts/install.sh --auth-mode oauth); the only env var you need to set is CODING_TOOLS_MCP_SERVER_URL (which must match the tunnel's stable public URL), and the script prints generated CLIENT_ID/CLIENT_SECRET/PASSWORD values on startup. Clients that cannot send custom bearer headers and do not speak OAuth should use anonymous read-only mode only for local/testing tunnels, or be placed behind an external auth proxy for production use.
See docs/remote-mcp.md for the exact modes and security notes.
Tool Profiles
full: exposes all tools with truthful annotations. This is the default for backward compatibility.read-only: recommended for remote or safe-mode clients; exposes only inspection tools, git read tools, image viewing, and default-cwd helpers.compat-readonly-all: exposes all tools but advertises every tool as read-only for clients that gate availability onreadOnlyHint. This is not a safety mode; mutation-capable tools such asapply_patch,exec_command,write_stdin, andkill_sessioncan still mutate local state.
Tools
P0 tools exposed by default:
server_infoget_default_cwdset_default_cwdread_filelist_dirlist_filessearch_textapply_patchexec_commandwrite_stdinkill_sessiongit_statusgit_diffgit_loggit_showgit_blamerequest_permissions
Additional image tool exposed by default:
view_image
For input/output schemas and result envelopes, see docs/tools-and-schemas.md and docs/profile-v0.1.md.
Safety Boundary
The runtime binds one workspace root per server process. Paths are workspace-relative by default. Absolute paths, .. traversal, and symlink escapes are rejected. Recursive listing/search excludes .git, .reference, node_modules, target, dist, build outputs, virtualenvs, and common caches by default.
exec_command runs under policy controls with workspace-bound cwd, timeout, output caps, sensitive-value and loader/startup environment rejection, destructive command checks, network-looking command checks, shell-expansion permission gates, indirect absolute-path checks, cancellation/kill cleanup, session deadline watchdogs, and bounded session buffers. On Linux hosts with Landlock support it also applies filesystem confinement; on Windows, macOS, or Linux hosts without Landlock, command results include a warning and external sandboxing is required before running untrusted commands. This is still not a complete OS/container sandbox; see SECURITY.md.
--dangerously-skip-all-permissions disables the permission gates above for operators who accept that risk. Do not use it for untrusted workspaces or untrusted MCP clients.
Compliance
make compliance
Compliance and CI commands are documented in docs/ci-and-tests.md. The checked-in report files are generated artifacts; inspect their suite field before treating them as full compliance evidence.
Dogfood And Benchmark
Dogfood and SWE-bench notes live in docs/dogfood.md, docs/swe-bench.md, and BENCHMARK.md. This repository does not claim a model-generated SWE-bench leaderboard result.
Development Commands
make lint
make typecheck
make test
make compliance
make ci
See docs/ci-and-tests.md for the full test matrix.
License
This project is source-available, not open source. See LICENSE. Internal evaluation, development, testing, and security review are permitted; redistribution, hosted third-party service use, and production commercial use require prior written permission.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file coding_tools_mcp-0.1.5.tar.gz.
File metadata
- Download URL: coding_tools_mcp-0.1.5.tar.gz
- Upload date:
- Size: 55.6 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.1
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
a2b13b6ab454bfa7e7e2d4e55bda8adb483b4f6ebaf8bd6c25156e13ccf6a0a0
|
|
| MD5 |
f9e5294d66ebe4cda52360fb5738209a
|
|
| BLAKE2b-256 |
47e559670547cad11d7292f5712f9c4fc50b63e89e14c0376a8871acc5b8ab02
|
File details
Details for the file coding_tools_mcp-0.1.5-py3-none-any.whl.
File metadata
- Download URL: coding_tools_mcp-0.1.5-py3-none-any.whl
- Upload date:
- Size: 46.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.1
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
d147cd5e76ae13bafea25b02daf0613d4a840adfffa471ce2c82eea387758b14
|
|
| MD5 |
e44965c9cade0fdaedc8f910896a486e
|
|
| BLAKE2b-256 |
c33f8c24bfc91300e060e4d55f16c684be1c7cbc4b48855885396aedf907e54f
|