Code intelligence MCP server for AI-assisted development — impact analysis, semantic search, and dependency graphs
Project description
Flyto Indexer
Know what breaks before you change it.
MCP server that gives AI assistants impact analysis, cross-project reference tracking, and code health scoring.
Zero dependencies. Pure Python. 100% local.
Without Flyto Indexer
You: "Rename validateOrder to validate_order"
AI: *renames the function*
*greps for "validateOrder"*
*finds 3 matches in the same project*
*misses 4 callers in the frontend repo*
*misses the API endpoint that routes to it*
*pushes broken code*
With Flyto Indexer
You: "Rename validateOrder to validate_order"
AI: → impact(target="validateOrder", change_type="rename")
⚠️ 7 call sites across 3 projects:
backend/checkout.py:42 — calls validateOrder()
backend/api/orders.py:18 — imports validateOrder
frontend/Cart.vue:55 — calls via useCheckout()
frontend/QuickBuy.vue:23 — calls via useCheckout()
mobile/OrderScreen.tsx:67 — API call to /api/validate
tests/test_orders.py:12 — unit test
tests/test_api.py:88 — integration test
Risk: HIGH — 3 projects affected
Test file: tests/test_orders.py
Cross-project: 2 other repos affected
*renames all 7 call sites, updates tests, pushes clean code*
That's the difference. grep finds text. This finds dependencies.
Install
pip install flyto-indexer
flyto-index setup .
That's it. One command does everything:
- Scans your project and builds the code index
- Writes
CLAUDE.mdwith tool usage instructions - Configures Claude Code MCP settings (
~/.claude/settings.json)
Restart Claude Code and start using it. Works with any MCP client — Claude Code, Cursor, Windsurf, etc.
Manual setup (other MCP clients)
If your MCP client doesn't use ~/.claude/settings.json, add this to your MCP config:
{
"mcpServers": {
"flyto-indexer": {
"command": "python3",
"args": ["-m", "flyto_indexer.mcp_server"]
}
}
}
Then scan and set up CLAUDE.md separately:
flyto-index scan .
flyto-index setup-claude .
Run from source
git clone https://github.com/flytohub/flyto-indexer.git
cd flyto-indexer && pip install -e .
flyto-index setup .
Uninstall
flyto-index setup . --remove
pip uninstall flyto-indexer
What It Does
Impact Analysis — the core feature
Every tool an AI already has (grep, file read, glob) finds text. None of them answer "what depends on this?"
One call gives you everything — references, blast radius, cross-project impact, and test files:
→ impact(target="useAuth")
References: 12 across 4 projects
flyto-cloud: LoginPage.vue, RegisterPage.vue, AuthGuard.ts, api.ts
flyto-pro: vscode_agent/tools.py, middleware/auth.py
flyto-vscode: ChatHandler.ts, AuthProvider.ts
flyto-core: modules/auth/login.py
Risk: HIGH — shared across 4 projects
Cross-project: 3 other repos affected
Test file: tests/test_auth.py
Works with uncommitted changes too:
→ impact(mode="unstaged")
3 symbols affected by your changes:
validate_order — 5 callers, test: tests/test_orders.py
OrderSchema — used in 2 API endpoints
format_receipt — no callers (safe)
Cross-Language API Tracking
Python backend endpoints automatically linked to TypeScript/Vue frontend callers:
→ structure(focus="apis")
POST /api/checkout
Defined in: backend/routes/order.py (create_order)
Called by: frontend/Cart.vue, frontend/api/orders.ts
Call count: 4
Detects FastAPI, Flask, Starlette decorators + fetch(), axios, $http calls.
Code Health & Security
One call audits everything — auto-expands weak dimensions with detailed findings:
→ audit()
Health: 74/100 (C)
⚠️ Security (60/100) — auto-expanded:
2 critical: hardcoded API keys in config.py, settings.py
1 high: SQL string concatenation in query.py
⚠️ Complexity (65/100) — auto-expanded:
process_data() — 87 lines, depth=6 → extract sub-functions
✓ Dead code (90/100) — passing
✓ Documentation (85/100) — passing
Git hotspots: order.py (42 commits, complexity=8.5)
Refactoring suggestions:
[high] process_data() → extract sub-functions
[medium] dead_fn() — unreferenced, 45 lines → safe to remove
Taint Analysis — track data flow, not just patterns
AST-based engine that tracks how untrusted data flows from sources to dangerous sinks. Unlike regex pattern matching, it follows variables through assignments, f-strings, and function calls — with sanitizer awareness to eliminate false positives.
→ audit(focus="security")
Taint flows detected:
[high] src/api/users.py:42
SQL injection: request.args.get('id') → cursor.execute(query)
Flow: request.args.get('id') → user_id → query (f-string) → cursor.execute()
Fix: Use parameterized query: cursor.execute(sql, params)
[critical] src/api/admin.py:18
RCE: request.form.get('code') → eval(code)
Fix: Never eval() user-controlled strings
- Python: Full AST analysis — tracks taint through assignments, f-strings, concat, for loops
- Cross-function: Detects when tainted data is passed as an argument to a function with a dangerous sink
- JS/TS/Go: Regex-based fallback for common taint patterns
- Sanitizer-aware:
int(),html.escape(),shlex.quote(), parameterized queries all break the taint chain - Project DSL: Declare custom sources / sinks / sanitizers in
.flyto-rules.yamlundertaint:(merged on top of built-in defaults;taint_rules.yamlis also still honored for backward compat)
# .flyto-rules.yaml
taint:
sources:
- pattern: "ctx.payload"
language: python
taint_type: user_input
sinks:
- pattern: "dangerousEval("
vuln_type: rce
severity: critical
recommendation: "Use sandbox runner"
sanitizers:
- pattern: "safe_html("
cleanses: ["xss"]
flyto-index add-taint-source . --pattern "ctx.payload" --taint-type user_input
flyto-index add-taint-sink . --pattern "dangerousEval(" --vuln-type rce --severity critical
flyto-index list-taint-rules .
Project Rules — AI learns from your corrections
.flyto-rules.yaml — structured, versionable project conventions that audit enforces automatically.
# .flyto-rules.yaml
architecture:
- rule: "i18n files must be in flyto-i18n/"
glob_deny: ["flyto-cloud/**/*.locale.json"]
style:
- rule: "Frontend does no data processing"
grep_deny: [{ pattern: '\breduce\s*\(', glob: "*.vue" }]
conventions:
- rule: "Commit messages in English"
When you correct the AI ("don't put i18n files there"), it auto-writes a verifiable rule — so the mistake never happens again, for any AI, any tool:
User corrects AI → add_rule() writes .flyto-rules.yaml → audit checks compliance
glob_deny— files in wrong locationsgrep_deny— forbidden code patterns in specific file typesconventions— text-only guidance (no automated check)- Rules accumulate over time — no upfront config needed
Architecture Layers — declare who may import whom
Declarative layer membership + import constraints. The indexer walks the import
graph (Python / TS / JS / Vue / Go) and flags every edge that crosses a forbidden
boundary. No plugin, no runtime — just .flyto-rules.yaml and audit.
layers:
- name: ui
paths: ["src/pages/**", "src/components/**"]
can_import: [lib, hooks, types]
reason: "UI is the top layer"
- name: lib
paths: ["src/lib/**"]
cannot_import: [ui]
reason: "lib must be UI-agnostic"
- name: db
paths: ["src/db/**"]
can_import: [types]
cross_imports_deny:
- from: "src/features/a/**"
to: "src/features/b/**"
reason: "features must not cross-import — use shared/"
flyto-index layers . # human-readable report
flyto-index layers . --json --fail-on-violation # CI gate (exits non-zero)
flyto-index add-layer --name ui --paths "src/ui/**" --cannot-import db
can_import— whitelist (only these layers + self allowed)cannot_import— blacklist (overrides the whitelist)- Path aliases from
tsconfig.json pathsand Go module paths fromgo.modare resolved automatically auditpicks up layer violations with no extra flag
Task Analysis — plan before you code
Scores risk across 6 dimensions and generates an execution plan:
→ task(action="plan", description="Rename validateOrder to validate_order", intent="refactor")
Dimensions:
blast_radius: HIGH (8.0) — 7 callers across 3 projects
breaking_risk: HIGH (7.0) — public API, used by external consumers
test_risk: MEDIUM (5.0) — 2/7 callers have test coverage
cross_coupling: HIGH (8.0) — referenced in 3 projects
complexity: LOW (2.0) — straightforward rename
rollback_difficulty: MEDIUM (5.0) — multi-project change
Execution Plan:
1. scope_callers → find_references("validateOrder")
2. verify_test_coverage → find_test_file("checkout.py")
3. check_cross_project → cross_project_impact("validateOrder")
4. ⛔ gate_before_plan → task_gate_check(phase="plan")
5. preview_changes → edit_impact_preview("validateOrder", "rename")
6. ⛔ gate_before_apply → task_gate_check(phase="apply")
Each step has pre-filled arguments — AI follows the data structure, not prompts. Server-side enforcement blocks skipping gates.
Tools
5 smart tools. Each one auto-enriches results with related data — no need to pick between dozens of granular tools.
| Tool | What it answers | Auto-enrichment |
|---|---|---|
search |
"Find code by name or description" | Merges BM25 + semantic search, attaches callers and file context |
impact |
"What breaks if I change this?" | References + blast radius + cross-project + test files in one call |
audit |
"How healthy is this project?" | Health score (0-100), auto-expands weak dimensions, taint analysis, rules compliance |
task |
"Plan, gate-check, or validate changes" | Risk scoring, execution plans, linter + tests |
structure |
"Show me the project layout" | Projects, APIs, dependencies, type contracts |
What each tool replaces
search replaces: search_code, semantic_search, fulltext_search, get_file_info, get_file_symbols, get_symbol_content, get_file_context
impact replaces: find_references, impact_analysis, batch_impact_analysis, edit_impact_preview, cross_project_impact, impact_from_diff
audit replaces: code_health_score, security_scan, taint_analysis, rules_check, find_dead_code, find_complex_functions, find_duplicates, suggest_refactoring, find_stale_files, find_todos, coverage_gaps
task replaces: analyze_task, task_gate_check, validate_changes
structure replaces: list_projects, list_apis, list_categories, dependency_graph, check_api_contracts, contract_drift, extract_type_schema
All legacy tools remain available in dispatch for backward compatibility and execution plan steps.
Languages
| Language | Parser | Extracts |
|---|---|---|
| Python | AST | Functions, classes, methods, decorators, API routes |
| TypeScript/JS | Custom | Functions, classes, interfaces, types, API calls |
| Vue | SFC | Components, composables, emits, props |
| Go | Custom | Functions, structs, methods, interfaces, embeddings, type aliases, const/var, impl tracking |
| Rust | Custom | Functions, structs, impl blocks, traits |
| Java | Custom | Classes, methods, interfaces, annotations |
How It Works
flyto-index scan .
- Parse — AST (Python) or regex (others) extracts every function, class, and import
- Graph — Builds dependency graph + reverse index (caller → callee)
- Serve — MCP server answers queries from the graph in memory
- Incremental — Re-scans only changed files, incrementally patches reverse_index and BM25 (10-50x faster than full rebuild)
- LSP — Optional type-aware references via pyright/tsserver/gopls/rust-analyzer (zero deps, graceful fallback)
.flyto-index/
├── index.json # Symbols + dependency graph + reverse index
├── content.jsonl # Source code (lazy-loaded)
├── bm25.json # BM25 keyword search index
├── semantic.json # TF-IDF + learned ConceptGraph (v2.2+)
└── manifest.json # Change tracking
CI: Block Risky Changes
# Fail the PR if changes affect too many call sites
- run: pip install flyto-indexer
- run: flyto-index scan .
- run: flyto-index check . --threshold medium --base main
CLI
flyto-index setup . # One command: scan + CLAUDE.md + MCP config
flyto-index scan . # Index (or re-index)
flyto-index impact useAuth --path . # Impact analysis
flyto-index check . --threshold medium # CI gate
flyto-index demo . # 30-second demo
flyto-index install-hook . # Auto-reindex on commit
flyto-index setup . --remove # Uninstall
Privacy
100% local. No code is sent anywhere. Delete .flyto-index/ to clean up completely.
Limitations
- Static analysis only — dynamic imports and metaprogramming not tracked
- No type inference — complex TypeScript generics simplified
- Cross-project tracking requires all projects indexed together
License
Apache License 2.0. See NOTICE for attribution.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file flyto_indexer-2.9.0.tar.gz.
File metadata
- Download URL: flyto_indexer-2.9.0.tar.gz
- Upload date:
- Size: 369.8 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
2983cfebe8a04ac16afadba3e8bee6de153dc0328d10bee3e346f1257d04b97e
|
|
| MD5 |
9aa8394b6369c066373a0c4d9e54064c
|
|
| BLAKE2b-256 |
089bb057dd6b26f6e02821ba7cf4dbd16a7bedc61c5ff995e6cb0dbbad7e47f0
|
File details
Details for the file flyto_indexer-2.9.0-py3-none-any.whl.
File metadata
- Download URL: flyto_indexer-2.9.0-py3-none-any.whl
- Upload date:
- Size: 422.9 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
c6594bd7d1fbb7e3af97d024c07ea06c5379311f441475cfd9d41f652bbdac71
|
|
| MD5 |
27fb72643164d984864c8f3cf030b7f3
|
|
| BLAKE2b-256 |
9609d22053a4293f67b7ce129ada3d6714e000238cbef153cd4c4461dcc98fbd
|