日本語 | 中文 | Español | Français | हिन्दी | Italiano | Português (BR)
Intelligence layer for developer insights — coverage analysis, test generation, refactoring suggestions, security audits, and UX insights via MCP.
- 9 Analysis Tools — Coverage gaps, behavior analysis, test generation, refactoring, UX insights, security audits, and more
- AST-Based Test Generation — Automatically generate pytest tests with mocks that actually compile
- Security Vulnerability Detection — OWASP-style scanning for SQL injection, command injection, hardcoded secrets
- Documentation Analysis — Find missing docstrings and suggest templates
- MCP Native — Integrates seamlessly with Claude and other MCP clients
pip install dev-brainOr for development:
git clone https://github.com/mcp-tool-shop-org/brain-dev.git
cd brain-dev
pip install -e ".[dev]"# Run the MCP server
dev-brainAdd to your Claude Desktop config (claude_desktop_config.json):
{
"mcpServers": {
"dev-brain": {
"command": "dev-brain"
}
}
}| Tool | Description |
|---|---|
coverage_analyze |
Compare observed patterns to test coverage, find gaps |
behavior_missing |
Find user behaviors not handled in code |
refactor_suggest |
Suggest refactoring based on complexity, duplication, naming |
ux_insights |
Extract UX insights from behavior patterns (dropoff, errors) |
| Tool | Description |
|---|---|
tests_generate |
Generate test suggestions for coverage gaps |
smart_tests_generate |
AST-based pytest generation with proper mocks and fixtures |
docs_generate |
Generate documentation templates for undocumented code |
| Tool | Description |
|---|---|
security_audit |
Scan for vulnerabilities (SQL injection, command injection, secrets, etc.) |
| Tool | Description |
|---|---|
brain_stats |
Get server statistics and configuration |
# Via MCP client
result = await client.call_tool("security_audit", {
"symbols": [
{
"name": "execute_query",
"file_path": "db.py",
"line": 10,
"source_code": "cursor.execute(f\"SELECT * FROM users WHERE id = {user_id}\")"
}
],
"severity_threshold": "medium"
})
# Returns: SQL injection vulnerability detected (CWE-89)result = await client.call_tool("smart_tests_generate", {
"file_path": "/path/to/your/module.py"
})
# Returns complete pytest file with fixtures and mocks┌─────────────────────────────────────────────────────────────┐
│ DEV BRAIN MCP SERVER │
├─────────────────────────────────────────────────────────────┤
│ Analyzers │
│ ├─ CoverageAnalyzer (test gaps) │
│ ├─ BehaviorAnalyzer (unhandled flows) │
│ ├─ RefactorAnalyzer (complexity, naming) │
│ ├─ UXAnalyzer (dropoff, errors) │
│ ├─ DocsAnalyzer (missing docs) │
│ └─ SecurityAnalyzer (vulnerabilities) │
├─────────────────────────────────────────────────────────────┤
│ Generators │
│ ├─ TestGenerator (skeleton tests) │
│ └─ SmartTestGenerator (AST-based pytest) │
└─────────────────────────────────────────────────────────────┘
| Category | Severity | CWE |
|---|---|---|
| SQL Injection | Critical | CWE-89 |
| Command Injection | Critical | CWE-78 |
| Insecure Deserialization | Critical | CWE-502 |
| Hardcoded Secrets | High | CWE-798 |
| Path Traversal | High | CWE-22 |
| Insecure Crypto | Medium | CWE-327 |
# Install dev dependencies
pip install -e ".[dev]"
# Run tests
pytest tests/ -v
# Run with coverage
pytest tests/ --cov=dev_brain --cov-report=html
# Type checking (optional)
mypy dev_brain- Data touched: reads Python source files via safe
ast.parse()for analysis. Returns JSON results with coverage gaps, test suggestions, and security findings. No code execution. - Data NOT touched: no file writes, no network requests, no data persistence, no databases, no external services. Read-only analysis only.
- Permissions required: read access to Python source files in the project directory.
See SECURITY.md for vulnerability reporting.
| Category | Score |
|---|---|
| A. Security | 10/10 |
| B. Error Handling | 10/10 |
| C. Operator Docs | 10/10 |
| D. Shipping Hygiene | 10/10 |
| E. Identity (soft) | 10/10 |
| Overall | 50/50 |
Assessed with
@mcptoolshop/shipcheck
MIT License — see LICENSE for details.
Built by MCP Tool Shop
