Native Rust whole-codebase analysis for AI agents.
AigisCode scans mixed-language repositories, builds a semantic graph, and emits machine-readable artifacts for structural triage. The current product surface is the Rust CLI. The legacy Python implementation has been removed from this repository.
AigisCode is not only for huge monoliths.
It is useful on:
- small repositories when you want a structured machine contract instead of a shallow lint pass
- medium repositories when architectural drift, hidden runtime wiring, or AI review handoff starts becoming painful
- large polyglot repositories when you need graph-backed evidence, policy, and bounded agent context instead of loading the whole codebase into a prompt
Use it when you want answers like:
- what are the real runtime entrypoints?
- which files are structurally central or suspiciously isolated?
- where does a dangerous API live, and is it reachable from entry code?
- which loop-local expensive operations are on a real caller chain?
- what should an AI reviewer inspect first without reading the whole repo?
Do not think of AigisCode as “only a big-codebase platform”. Think of it as a layered analyzer:
- on a small repo, it gives you a precise artifact family and review contract
- on a large repo, it becomes a graph-backed reduction layer for human and AI review
cargo install --git https://github.com/Draivix/aigiscode.git aigiscore --bin aigiscode
cd your-project
aigiscode analyze .For local development from this repository:
cargo run --bin aigiscode -- analyze .For a quick human-readable summary after analysis:
aigiscode report .
cat .aigiscode/aigiscode-report.mdFor a graph-backed AI handoff without executing any agent:
aigiscode agent .Use:
aigiscode analyze .aigiscode report .aigiscode info .
Why:
- you usually want the summary, findings, surface, and guard decision
- full graph artifacts are still useful, but you may not need
agent-runorcypher
Use:
aigiscode analyze .aigiscode surface .aigiscode agent .- optionally
aigiscode tune .
Why:
- this is where architecture surface, topology, packets, and AI handoff start paying off
- policy tuning starts to matter
Use:
aigiscode analyze . --output-dir <dir>aigiscode agent .aigiscode agent-run . --adapter <name>aigiscode graph . --kuzuaigiscode cypher .
Why:
- large repos need bounded graph packets, topology, and queryable graph projections
- this is where the AI-facing surfaces become first-class, not optional
AigisCode is easiest to use correctly if you think in layers:
- Parsing and resolution
- mixed-language source extraction
- symbol/reference resolution
- framework/runtime overlays
- Graph truth
semantic-graph.jsondependency-graph.jsonevidence-graph.json
- Detector and assessment truth
- dead code
- hardwiring
- native security
- architectural assessment
- secondary scanner evidence
- Review and guard truth
architecture-surface.jsonreview-surface.jsonconvergence-history.jsonguard-decision.json
- AI handoff and execution
agentic-review.jsongraph-packets.jsonrepository-topology.jsonagent-runagent-spider
This matters because not every command is for the same job. analyze builds
truth. surface and report summarize it. agent packages it for AI. graph
and cypher expose lower-level graph access.
aigiscode analyze <path> Run deterministic analysis and write native artifacts
aigiscode agent <path> Print the graph-backed AI review contract
aigiscode agent-run <path> Execute the AI review through a concrete adapter and write agent reports
aigiscode agent-spider <path> Crawl top task packets through a concrete adapter and write per-packet reports
aigiscode report <path> Compatibility alias that also writes aigiscode-report.json
aigiscode analyze-rust <path> Compatibility alias for analyze
aigiscode info <path> Inspect existing Rust-native artifact state
aigiscode plugins List built-in runtime/framework overlay plugins
aigiscode tune <path> Suggest a conservative policy patch from current analysis signals
aigiscode surface <path> Emit architecture surface JSON
aigiscode mcp <path> Start the native Rust stdio MCP server for one repository
aigiscode version Print CLI version
Use --output-dir <path> to write artifacts outside .aigiscode/.
Use --no-write to print JSON without writing artifacts.
Use --external-tool <name> or --external-tools all to run native Rust
external adapters alongside deterministic analysis.
Use this first.
It runs the full deterministic pipeline and writes the full native artifact family. If you are unsure what command to use, use this one.
Use it when you want:
- graph artifacts
- detector output
- review surface
- guard decision
- AI handoff artifacts
Use this when you want the same analysis pipeline but care mainly about the consolidated report output.
It is a compatibility alias for analyze that still writes the full artifacts.
Use this when artifacts already exist and you want a quick structured view of their current state without reasoning from scratch.
Good for:
- shell scripts
- CI inspection
- checking whether a previous run already produced the artifacts you need
Use this when you mainly want the architecture-facing summary and not the raw low-level graph files.
Good for:
- UI layers
- dashboards
- quick triage workflows
Use this when the consumer is another AI agent, not just a human.
It runs the same analysis pipeline, then prints the graph-backed AI review contract built around:
- bounded packets
- traces
- code flows
- source/sink paths
- semantic state-flow evidence
- topology summaries
Use this when you want AigisCode to execute the review through a concrete AI adapter, not only prepare the contract.
Current adapters:
codex-execresponses-httpcodex-sdk
Use this when you want multiple top task packets executed, not just a single whole-repo AI review.
This is for crawling the highest-priority bounded investigations.
Use this when you want graph artifacts without the full detector/report stack.
Good for:
- graph debugging
- graph export
- code-understanding workflows
Add --kuzu when you also want the optional Kuzu materialization.
Use this when you want to query the optional Kuzu graph index for code understanding.
This is lower-level than surface or agent.
Use this after analysis when you want a conservative starter patch for
.aigiscode/policy.json.
Use this when you want to know which built-in semantic model packs and runtime plugins are active in the current binary.
Use this when another tool or agent wants to consume AigisCode through MCP over stdio instead of reading JSON files directly.
Write artifacts outside .aigiscode/.
Use this when:
- you do not want to dirty the target repo
- you are comparing repeated runs
- you want to keep multiple artifact baselines
Print JSON to stdout without writing artifacts.
Use this for:
- shell pipelines
- smoke checks
- quick experiments
Do not use it if you want the full reusable artifact family on disk.
Run external analyzers and normalize them into the same report/review surface.
Use this when you want:
- OpenGrep / Trivy / Grype / Gitleaks / audit-tool enrichment
- unified review and policy handling across native and imported findings
aigiscode analyze .
cat .aigiscode/aigiscode-report.mdaigiscode analyze . --output-dir /tmp/my-repo-aigis
cat /tmp/my-repo-aigis/aigiscode-report.mdaigiscode agent . --output-dir /tmp/my-repo-aigis
cat /tmp/my-repo-aigis/agentic-review.jsonaigiscode agent-run . --adapter codex-exec --output-dir /tmp/my-repo-aigisaigiscode graph . --kuzu --output-dir /tmp/my-repo-graphaigiscode cypher . --output-dir /tmp/my-repo-graphaigiscode analyze writes:
.aigiscode/deterministic-analysis.json
.aigiscode/semantic-graph.json
.aigiscode/dependency-graph.json
.aigiscode/evidence-graph.json
.aigiscode/contract-inventory.json
.aigiscode/doctrine-registry.json
.aigiscode/deterministic-findings.json
.aigiscode/ast-grep-scan.json
.aigiscode/external-analysis.json
.aigiscode/architecture-surface.json
.aigiscode/review-surface.json
.aigiscode/convergence-history.json
.aigiscode/guard-decision.json
.aigiscode/aigiscode-handoff.json
.aigiscode/agentic-review.json
.aigiscode/graph-packets.json
.aigiscode/repository-topology.json
.aigiscode/aigiscode-report.json
.aigiscode/aigiscode-report.md
When external tools are enabled, raw scanner artifacts are archived under:
.aigiscode/reports/<run_id>/raw/
aigiscode surface prints the architecture surface JSON and also writes:
.aigiscode/architecture-surface.json
aigiscode mcp serves tools, resources, and prompts over stdio from the same
native artifact family.
If you only read a few files, start here:
aigiscode-report.json- consolidated machine summary
aigiscode-report.md- readable human summary
architecture-surface.json- architecture-facing triage view
review-surface.json- visibility/policy-adjusted review contract
guard-decision.json- current allow/warn/block posture
agentic-review.json- graph-backed AI review contract
Read the lower-level graph artifacts when you need deeper explanation:
semantic-graph.json- canonical resolved graph
dependency-graph.json- low-noise dependency projection
evidence-graph.json- richer evidence-oriented projection
deterministic-findings.json- raw detector truth before summarization
aigiscode agent runs the normal analysis pipeline, writes the same artifact
family, and prints agentic-review.json as the primary machine contract for an
AI reviewer. The AI contract is graph-backed, includes diff-aware task packets,
trace-style evidence chains, bounded typed multi-path graph traces, and bounded
code-flow style evidence paths plus explicit source/sink endpoints, bounded
semantic state-flow evidence for mutable carriers when the slice supports it, and now
carries an adapter catalog with:
- local
codex exec - direct OpenAI Responses HTTP
- optional TypeScript Codex SDK sidecar
ast-grep-scan.json is the first secondary scanner-plane artifact. It carries
typed, provenance-rich structural rule hits from in-process ast-grep
evaluation. Today it covers three pilot families:
- loop-local expensive-operation rules (
collection scan,sort,regex compile,json decode/parse, andfilesystem read/checkin loops) that strengthenAlgorithmicComplexityHotspot - dangerous-API rules (
eval,exec/system, unsafe deserialization, unsafe HTML output) that strengthen nativeSecurityDangerousApi` findings - narrow framework-misuse rules (
raw env outside config/bootstrap,raw container lookup outside provider/bootstrap or injection boundaries) that strengthen nativeSanctionedPathBypassfindings
The engine stays in core, but framework-specific rule catalogs are now allowed
to contribute findings with explicit provenance such as
ast_grep.pattern.laravel and ast_grep.pattern.django, so framework misuse
can scale without turning the core scanner file into a framework registry.
It is secondary evidence, not semantic-graph truth, reachability truth, or
doctrine truth. aigiscode-report.json.summary and
architecture_surface.overview now also break those scanner hits down by
family so the scanner mix is visible without opening the raw artifact.
graph-packets.json complements agentic-review.json with bounded,
doctrine-aware graph neighborhoods for the current top packets and focus files.
Fallback focus-file packets now also carry bounded traces, code flows,
source/sink paths, and semantic state-flow evidence when guardian packets are
absent, so the packet layer stays useful even on degraded or slice-only runs.
repository-topology.json complements both with a flatter orchestration map
over top-level zones, manifests, runtime entries, contract-bearing directories,
cross-zone links, direct zone-to-finding / zone-to-packet links, zone-level
triage briefs, structured triage steps, focus clusters for flat zones,
explicit cross-zone pressure summaries with linked-zone previews, direct causal
bridge summaries, topology-level semantic-state previews/counts and proof-aware
summaries for mutable carriers, a topology recommended start slice, spillover observations,
convergence-state hints, and lightweight ownership hints with explicit basis
metadata so agents can reason about repository layout, cross-zone drag,
semantic propagation, and the next slice without loading the full evidence
graph. Route-declared files now also promote runtime-entry shape here, so
modern Symfony/Laravel-style controller surfaces are no longer invisible in
topology. Scoped/cropped analyses now also expose explicit boundary_truncated
truth here instead of implying fake orphan debt for files
whose real callers live outside the analyzed slice.
Topology semantic-state previews now also expose stable flow IDs, flow kind,
and proof tier (exact_resolved, receiver_typed, heuristic), and
zones/steps/clusters carry proof summaries plus compact flow refs so agents can
tell strong propagation evidence from weak heuristic hints and jump back to one
exact flow instead of only reading labels.
aigiscode agent-run is the first real executor. It materializes the normal
artifact family, selects an adapter, and writes:
.aigiscode/agent-review.json
.aigiscode/agent-review.md
.aigiscode/agent-output-schema.json
.aigiscode/agent-execution.jsonl
aigiscode agent-spider crawls the top task packets from agentic-review.json
through the same adapter boundary and writes:
.aigiscode/agent-spider-report.json
.aigiscode/agent-spider/<packet>/agent-review.json
.aigiscode/agent-spider/<packet>/agent-review.md
.aigiscode/agent-spider/<packet>/agent-output-schema.json
.aigiscode/agent-spider/<packet>/agent-execution.jsonl
Current working adapters:
codex-execfor local Codex CLI executionresponses-httpfor direct Rustv1/responsesexecution withOPENAI_API_KEY
Planned adapter:
codex-sdkas a thin optional TypeScript sidecar around the official Codex SDK
- Circular dependencies
- Bottlenecks and orphan files
- Boundary-truncated files on scoped analyses
- Dead code candidates
- Hardwired values
- Native dangerous-API security findings
- Graph-backed boundary/input-to-sink security evidence
- Algorithmic complexity hotspots with caller/callee pressure and operation provenance
- Declared routes, hooks, env keys, config keys, and symbolic runtime contracts
- Architecture-surface summaries for UI and agent workflows
Some of those are stronger than others today. The product is designed to emit:
- hard graph truth where it has it
- structured heuristic evidence where exact proof is not yet available
That is why some contracts carry explicit provenance, scanner support, flow paths, or boundary-truncated markers.
The Rust review/report layer now reads optional suppression files from the target repository:
.aigiscode/policy.jsonfor project-wide patterns such asorphan_entry_patterns,abandoned_entry_patterns,skip_path_patterns,allowed_literals, andrepeated_literal_min_occurrences, plus external-finding controls likeexternal.skip_tools,external.skip_categories, andexternal.allowed_rule_ids.aigiscode/rules.jsonfor narrow per-finding exclusions by finding type, file pattern, and optional symbol/value or external tool match
Raw deterministic analysis remains in deterministic-analysis.json. The
policy/rule overlay is reflected in review-surface.json, aigiscode-report.json,
and the native MCP server.
The Rust CLI can also orchestrate external analyzers and normalize their output
into external-analysis.json, review-surface.json, aigiscode-report.json,
and MCP finding workflows.
Current native adapters:
ruffgitleakspip-auditosv-scannercomposer-auditnpm-auditcargo-denycargo-clippy
- Rust
- PHP
- Python
- TypeScript / JavaScript
- Ruby
Language support here means parsing and graph extraction in the Rust engine. Parity is still in progress for some higher-level detectors.
Use aigiscode plugins to inspect the live binary, but the current built-in
families include:
- semantic model packs for:
- Django routes
- Django signals
- Django settings
- PHP hook maps
- WordPress REST routes
- runtime plugins for:
- queue dispatch
- Laravel container resolution
- generic signal callbacks
- WordPress hooks
These are overlays on top of the generic core. They add framework/runtime meaning without turning the core parser and graph layers into framework-specific code paths.
cargo fmt
cargo test
cd website && npm ci && npm run build- Rust is the only product runtime.
- Python packaging, CLI, MCP host, report shell, and tests have been removed.
- Public docs and website examples now target the Rust CLI.
MIT. See LICENSE.