claude-cartographer
Verified Safeby pect0ral
Overview
Token-optimized codebase exploration and analysis for Claude Code, significantly reducing API token usage.
Installation
./setup.sh /path/to/your/projectSecurity Notes
The project extensively uses regular expressions and Python's AST module to parse and analyze source code files, including identifying security-relevant patterns (e.g., `eval`, `system`, SQL queries, XSS sinks) within the *target codebase*. These identified patterns are for static analysis and are not executed by the tool itself. The `bootstrap.py` installer and the `cli.py` module use `subprocess.run` for standard operations like virtual environment management, package installation (`pip`), and executing the `claude-map` binary itself. Inputs to these subprocess calls are derived from resolved file paths or hardcoded commands, mitigating direct shell injection risks. The Claude Code hooks queue file paths via `echo` to a text file, which is then processed by the `claude-map update` command, further limiting direct command injection from file paths.
Similar Servers
consult-llm-mcp
An MCP server that allows AI agents like Claude Code to consult stronger, more capable AI models (e.g., GPT-5.2, Gemini 3.0 Pro) for complex code analysis, debugging, and architectural advice.
cldcde
A persistent context manager that scrapes, stores, searches, and analyzes AI conversations from various platforms (ChatGPT, Grok, Gemini, Claude) to support project development and insights.
mcp-devtools-server
This MCP server standardizes development tool patterns and provides AI-powered integrations to enable Claude Code to generate code more efficiently, reduce errors, and improve autocorrection for various programming languages and workflows.
claude-agent-mcp-skills
Assists with analyzing and applying code migrations between different frameworks and their versions.