CodeSentinel

Provides security and quality analysis for MCP client code with pattern-based checks and actionable reports.
  • typescript

0

GitHub Stars

typescript

Language

2 months ago

First Indexed

3 weeks ago

Catalog Refreshed

Documentation & install

Readme and setup notes from the catalogue, plus a client-ready config you can copy for your MCP host.

Installation

Add the following to your MCP client configuration file.

Configuration

View docs

CodeSentinel MCP Server provides pattern-based quality analysis for Model Context Protocol (MCP) clients. It scans code for security issues, deceptive patterns, incomplete implementations, and strengths, delivering actionable feedback so you can improve reliability before code reaches production.

How to use

You connect your MCP client to CodeSentinel to obtain automated analysis as part of your development workflow. Run quality checks against agent-generated code, review structured outputs, and act on highlighted issues, recommended fixes, and strengths. Use the HTTP remote server for centralized analysis in the cloud, or run a local MCP server instance to keep analysis on your own infrastructure.

How to install

Prerequisites: ensure you have Node.js and npm installed on your machine. You will also want a Claude Code or compatible MCP client configured to talk to your MCP server.

# Install the remote cloud MCP server (no local setup required)
npx -y code-sentinel-mcp

# Or set up a local MCP server (Node.js environment)
npm install -g code-sentinel-mcp

# Start the local MCP server (global install example)
code-sentinel-mcp

Additional notes

For cloud-hosted usage, you can connect through the remote MCP endpoint and use the appropriate MCP client to register the server. If you prefer a local, self-hosted option, you can install the MCP server globally and run it directly on your machine.

Available tools

analyze_code

Performs a full code analysis and returns structured JSON detailing all issues, strengths, and summary statistics.

generate_report

Produces a comprehensive visual HTML report alongside a Markdown summary for human review.

check_security

Focuses on security-oriented analysis to identify vulnerabilities and risky patterns.

check_deceptive_patterns

Detects deceptive patterns such as empty catch blocks, silent failures, and hidden errors.

check_placeholders

Finds TODOs, FIXMEs, and placeholder or incomplete implementations.

analyze_patterns

Analyzes architectural, design, and implementation patterns and provides actionable suggestions.

analyze_design_patterns

Examines GoF design patterns and maps findings to your code structure.

Built by
VeilStrat
AI signals for GTM teams
© 2026 VeilStrat. All rights reserved.All systems operational