Aigiscode
AI-powered code guardian — static analysis that watches your entire codebase
Install / Use
/learn @Draivix/AigiscodeREADME
AigisCode
Native Rust whole-codebase analysis for AI agents.
AigisCode scans mixed-language repositories, builds a semantic graph, and emits machine-readable artifacts for structural triage. The current product surface is the Rust CLI. The legacy Python implementation has been removed from this repository.
What AigisCode Is For
AigisCode is not only for huge monoliths.
It is useful on:
- small repositories when you want a structured machine contract instead of a shallow lint pass
- medium repositories when architectural drift, hidden runtime wiring, or AI review handoff starts becoming painful
- large polyglot repositories when you need graph-backed evidence, policy, and bounded agent context instead of loading the whole codebase into a prompt
Use it when you want answers like:
- what are the real runtime entrypoints?
- which files are structurally central or suspiciously isolated?
- where does a dangerous API live, and is it reachable from entry code?
- which loop-local expensive operations are on a real caller chain?
- what should an AI reviewer inspect first without reading the whole repo?
Do not think of AigisCode as “only a big-codebase platform”. Think of it as a layered analyzer:
- on a small repo, it gives you a precise artifact family and review contract
- on a large repo, it becomes a graph-backed reduction layer for human and AI review
Quick Start
cargo install --git https://github.com/Draivix/aigiscode.git aigiscore --bin aigiscode
cd your-project
aigiscode analyze .
For local development from this repository:
cargo run --bin aigiscode -- analyze .
For a quick human-readable summary after analysis:
aigiscode report .
cat .aigiscode/aigiscode-report.md
For a graph-backed AI handoff without executing any agent:
aigiscode agent .
Recommended Usage By Repo Size
Small repositories
Use:
aigiscode analyze .aigiscode report .aigiscode info .
Why:
- you usually want the summary, findings, surface, and guard decision
- full graph artifacts are still useful, but you may not need
agent-runorcypher
Medium repositories
Use:
aigiscode analyze .aigiscode surface .aigiscode agent .- optionally
aigiscode tune .
Why:
- this is where architecture surface, topology, packets, and AI handoff start paying off
- policy tuning starts to matter
Large or framework-heavy repositories
Use:
aigiscode analyze . --output-dir <dir>aigiscode agent .aigiscode agent-run . --adapter <name>aigiscode graph . --kuzuaigiscode cypher .
Why:
- large repos need bounded graph packets, topology, and queryable graph projections
- this is where the AI-facing surfaces become first-class, not optional
Product Layers
AigisCode is easiest to use correctly if you think in layers:
- Parsing and resolution
- mixed-language source extraction
- symbol/reference resolution
- framework/runtime overlays
- Graph truth
semantic-graph.jsondependency-graph.jsonevidence-graph.json
- Detector and assessment truth
- dead code
- hardwiring
- native security
- architectural assessment
- secondary scanner evidence
- Review and guard truth
architecture-surface.jsonreview-surface.jsonconvergence-history.jsonguard-decision.json
- AI handoff and execution
agentic-review.jsongraph-packets.jsonrepository-topology.jsonagent-runagent-spider
This matters because not every command is for the same job. analyze builds
truth. surface and report summarize it. agent packages it for AI. graph
and cypher expose lower-level graph access.
Commands
aigiscode analyze <path> Run deterministic analysis and write native artifacts
aigiscode agent <path> Print the graph-backed AI review contract
aigiscode agent-run <path> Execute the AI review through a concrete adapter and write agent reports
aigiscode agent-spider <path> Crawl top task packets through a concrete adapter and write per-packet reports
aigiscode report <path> Compatibility alias that also writes aigiscode-report.json
aigiscode analyze-rust <path> Compatibility alias for analyze
aigiscode info <path> Inspect existing Rust-native artifact state
aigiscode plugins List built-in runtime/framework overlay plugins
aigiscode tune <path> Suggest a conservative policy patch from current analysis signals
aigiscode surface <path> Emit architecture surface JSON
aigiscode mcp <path> Start the native Rust stdio MCP server for one repository
aigiscode version Print CLI version
Use --output-dir <path> to write artifacts outside .aigiscode/.
Use --no-write to print JSON without writing artifacts.
Use --external-tool <name> or --external-tools all to run native Rust
external adapters alongside deterministic analysis.
Which Command Should I Use?
aigiscode analyze <path>
Use this first.
It runs the full deterministic pipeline and writes the full native artifact family. If you are unsure what command to use, use this one.
Use it when you want:
- graph artifacts
- detector output
- review surface
- guard decision
- AI handoff artifacts
aigiscode report <path>
Use this when you want the same analysis pipeline but care mainly about the consolidated report output.
It is a compatibility alias for analyze that still writes the full artifacts.
aigiscode info <path>
Use this when artifacts already exist and you want a quick structured view of their current state without reasoning from scratch.
Good for:
- shell scripts
- CI inspection
- checking whether a previous run already produced the artifacts you need
aigiscode surface <path>
Use this when you mainly want the architecture-facing summary and not the raw low-level graph files.
Good for:
- UI layers
- dashboards
- quick triage workflows
aigiscode agent <path>
Use this when the consumer is another AI agent, not just a human.
It runs the same analysis pipeline, then prints the graph-backed AI review contract built around:
- bounded packets
- traces
- code flows
- source/sink paths
- semantic state-flow evidence
- topology summaries
aigiscode agent-run <path>
Use this when you want AigisCode to execute the review through a concrete AI adapter, not only prepare the contract.
Current adapters:
codex-execresponses-httpcodex-sdk
aigiscode agent-spider <path>
Use this when you want multiple top task packets executed, not just a single whole-repo AI review.
This is for crawling the highest-priority bounded investigations.
aigiscode graph <path>
Use this when you want graph artifacts without the full detector/report stack.
Good for:
- graph debugging
- graph export
- code-understanding workflows
Add --kuzu when you also want the optional Kuzu materialization.
aigiscode cypher <path>
Use this when you want to query the optional Kuzu graph index for code understanding.
This is lower-level than surface or agent.
aigiscode tune <path>
Use this after analysis when you want a conservative starter patch for
.aigiscode/policy.json.
aigiscode plugins
Use this when you want to know which built-in semantic model packs and runtime plugins are active in the current binary.
aigiscode mcp <path>
Use this when another tool or agent wants to consume AigisCode through MCP over stdio instead of reading JSON files directly.
Common CLI Options
--output-dir <dir>
Write artifacts outside .aigiscode/.
Use this when:
- you do not want to dirty the target repo
- you are comparing repeated runs
- you want to keep multiple artifact baselines
--no-write
Print JSON to stdout without writing artifacts.
Use this for:
- shell pipelines
- smoke checks
- quick experiments
Do not use it if you want the full reusable artifact family on disk.
--external-tool <name> / --external-tools <csv>
Run external analyzers and normalize them into the same report/review surface.
Use this when you want:
- OpenGrep / Trivy / Grype / Gitleaks / audit-tool enrichment
- unified review and policy handling across native and imported findings
Example Workflows
Fast local repo check
aigiscode analyze .
cat .aigiscode/aigiscode-report.md
Analyze without writing into the repo
aigiscode analyze . --output-dir /tmp/my-repo-aigis
cat /tmp/my-repo-aigis/aigiscode-report.md
Prepare AI review context
aigiscode agent . --output-dir /tmp/my-repo-aigis
cat /tmp/my-repo-aigis/agentic-review.json
Execute the AI review
aigiscode agent-run . --adapter codex-exec --output-dir /tmp/my-repo-aigis
Build graph-only artifacts
aigiscode graph . --kuzu --output-dir /tmp/my-repo-graph
Query the Kuzu graph
aigiscode cypher . --output-dir /tmp/my-repo-graph
Artifacts
aigiscode analyze writes:
.aigiscode/deterministic-analysis.json
.aigiscode/semantic-graph.json
.aigiscode/dependency-graph.json
.aigiscode/evidence-graph.json
.aigiscode/contract-inventory.json
.aigiscode/doctrine-registry.json
.aigiscode/deterministic-findings.json
.aigiscode/ast-grep-scan.json
.aigiscode/external-analysis.json
.aigiscode/architecture-surface.json
.aigiscode/review-surface.json
.aigiscode/convergence-history.json
.aigiscode/guard-decision.json
.aigiscode/aigiscode-handoff.json
.aigiscode/agentic-review.json
.aigiscode/graph-packets.json
.aigiscode/repository-topology.json
.aigiscode/aigiscode-report.json
.aigiscode/aigiscode-report.md
When external
Related Skills
node-connect
352.0kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
claude-opus-4-5-migration
111.1kMigrate prompts and code from Claude Sonnet 4.0, Sonnet 4.5, or Opus 4.1 to Opus 4.5
frontend-design
111.1kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
Writing Hookify Rules
111.1kThis skill should be used when the user asks to "create a hookify rule", "write a hook rule", "configure hookify", "add a hookify rule", or needs guidance on hookify rule syntax and patterns.
