Everything you need for verifiable FastAPI changes
Local-first analysis and policy enforcement for Python projects—grounded in code truth and machine-readable outputs.
Atlas (Code Intelligence)
Local-first indexing for Python
Index your codebase once, then use search, dependency graphs, impact analysis, and span-first retrieval to ground edits in evidence.
Scan & index
ProductionBuild the project index under .ranex/ so queries are fast and reproducible.
ranex atlas scanName-based search
ProductionFind symbols and modules quickly (use --json for stable automation contracts).
ranex atlas search "<query>"Dependency & impact analysis
ProductionEstimate blast radius using import/call graphs before making risky changes or refactors.
ranex atlas file-impact <file_path>Cycles, duplicates, and patterns
ProductionFind dependency cycles and potential duplication. These are heuristic signals meant to guide review.
ranex atlas cycles / duplicatesSpan-first retrieval
ProductionGet verifiable (file, start_line, end_line) spans instead of guessing or dumping full files.
ranex atlas search-spans / read-spanSecurity-aware indexing & reading
ProductionOptional deny rules prevent indexing/reading sensitive paths when running Atlas via tooling/AI.
.ranex/config.toml [security]Dependency Firewall
Policy-based import validation
Validate imports against an explicit policy to prevent risky patterns, typosquatting, and accidental/hallucinated dependencies.
Check one import
ProductionValidate a single import path against your policy.
ranex firewall check-import <import_path>Analyze a file
ProductionScan a Python file and evaluate its imports against the firewall policy.
ranex firewall analyze-file <file_path>Typosquatting detection
ProductionDetect suspicious lookalike package names before they enter your dependency graph.
ranex firewall typosquat <package_name>Policy inspection
ProductionAudit current mode, allowlists, blocked patterns, and rules for review/CI.
ranex firewall info / list-rulesPython API
ProductionUse Firewall(project_root) to validate imports programmatically.
from ranex import FirewallFastAPI Analysis
Endpoint extraction + reports
Static analysis for FastAPI services: endpoint discovery, router topology, scaling checks, and truth capsules for verifiable endpoint context.
Endpoint discovery
ProductionDetect FastAPI endpoints via HTTP-method decorators and store method/path metadata when statically provable.
ranex atlas scanScaling analysis (policy-driven)
ProductionRun a static report to surface patterns that can cause performance or scalability issues (not runtime profiling).
ranex atlas fastapi-scaling-report --jsonRouter topology
ProductionUnderstand how routes are split across routers vs direct app routes (useful as services grow).
ranex atlas fastapi-router-topology --jsonTruth capsule (static endpoint bundle)
ProductionGenerate a structured JSON bundle for one endpoint/handler with grouped spans and unresolved edges when static proof is missing.
ranex atlas fastapi-truth-capsule --jsonInterfaces
CLI + Python API + MCP
Use Ranex from the CLI, programmatically from Python, or from MCP-compatible AI assistants via a local stdio server.
CLI commands
ProductionScan and query from a terminal with consistent flags like --project-root and --json.
ranex atlas ... / ranex firewall ...Python API
ProductionUse Atlas(project_root) and Firewall(project_root) in scripts/tests for automation.
from ranex import Atlas, FirewallMCP server (optional)
ProductionExpose Atlas and Firewall tools over stdio to MCP-compatible assistants using RANEX_PROJECT_ROOT.
ranex-mcp-serverSpan-first MCP workflows
ProductionUse search-spans and read-span to ground assistants in verifiable file/line ranges.
ranex_atlas_search / ranex_atlas_read_spanMCP environment variables
ProductionSelect project root and log level without changing client configuration.
RANEX_PROJECT_ROOT / RANEX_LOGConfiguration & Privacy
Project-local state under .ranex/
Ranex is local-first by design. Configuration and state live inside your project directory and can be controlled via config files and deny rules.
Project-local files
ProductionAtlas DB, firewall policy, and optional FastAPI scaling policy live under .ranex/.
.ranex/atlas.sqlite / .ranex/firewall.yamlIgnore file
ProductionExclude directories/files you do not want indexed during scans.
.ranexignoreSecurity allow/deny rules
ProductionPrevent indexing/reading sensitive file types and directories when using Ranex via automation or AI assistants.
.ranex/config.toml [security]Recommended practices
ProductionCommit firewall.yaml (policy as code). Do not commit atlas.sqlite unless you have a reason.
DOCS/END-USER/PRIVACY_SECURITY.mdDrop-in project setup
Install Ranex, initialize a firewall policy, and build an Atlas index. All project state lives under .ranex/.
Ready to get started?
Install Ranex and follow the end-user docs for Atlas, Firewall, and MCP integration.