# code-inspect-audit

`station__code-analysis__code-inspect-audit` · external (needs EXECUTION_BACKEND_URL configured) · domain `code-analysis` · pv-relevance `non-pv`

Run a full code inspection audit on a file or directory.

> **Note:** This tool routes through an external execution backend. If `EXECUTION_BACKEND_URL` is unset on the server, calls return JSON-RPC error `-32603 "Tool execution backend not configured"`. Tools with `backend: native` execute in-process and are always callable.

## Agent metadata

- `idempotent`: unknown
- `read_only`: unknown
- `expected_latency_ms`: unknown (not yet contract-tested)
- `cost_tokens_estimate`: unknown

## Input schema

- `cioms_term` *string* (required) — Corresponding CIOMS/ICH term to compare
- `fda_term` *string* (required) — FDA term to audit
- `include_components` *boolean*

## Example call

```json
POST /api/mcp
Content-Type: application/json

{
  "jsonrpc": "2.0",
  "id": 1,
  "method": "tools/call",
  "params": {
    "name": "station__code-analysis__code-inspect-audit",
    "arguments": {
      "cioms_term": "",
      "fda_term": ""
    }
  }
}
```

## Related

- [/tools](/tools) — all 3062 tools
- [/tools/code-analysis__code-inspect-audit](/tools/code-analysis__code-inspect-audit) — HTML page
- [/tools/code-analysis__code-inspect-audit/json](/tools/code-analysis__code-inspect-audit/json) — JSON form (agent-friendly)
- [/api/mcp](/api/mcp) — endpoint
- [/AGENTS.md](/AGENTS.md) — agent guide
