Lexlink Ko Mcp

C+ 74 completed
Api
cli / python · tiny
36
Files
11,705
LOC
1
Frameworks
6
Languages

Pipeline State

completed
Run ID
#372650
Phase
done
Progress
1%
Started
Finished
2026-04-13 01:31:02
LLM tokens
0

Pipeline Metadata

Stage
Skipped
Decision
skip_scaffold_dup
Novelty
49.80
Framework unique
Isolation
Last stage change
2026-04-16 18:15:42
Deduplication group #48377
Member of a group with 1 similar repo(s) — canonical #73174 view group →
Top concepts (2)
Project DescriptionTesting
Powered by Repobility — scan your code at https://repobility.com

AI Prompt

Create a Python CLI server, similar to the LexLink project, that acts as an MCP server to access the Korean National Law Information API. I need it to expose 26 MCP Tools and 2 MCP Resources. The system should support searching and retrieving various types of Korean laws, including administrative rules and court precedents. Crucially, it must implement Phase 5 features like semantic search (`aiSearch`) and related laws discovery. Please ensure it handles Korean text properly, supports response formats like HTML or XML, and includes robust error handling.
python cli mcp api korean-law llm tools legal-tech python-cli
Generated by gemma4:latest

Catalog Information

The lexlink project provides a server for accessing the Korean National Law Information API.

Description

Lexlink is a server that enables access to the Korean National Law Information API. It uses Python and various libraries such as BeautifulSoup, Pydantic, and Uvicorn to provide a robust and efficient interface to the API. The project's primary function is to facilitate the retrieval of legal information from the API.

الوصف

هذا المشروع هو خادم يسمح بالوصول إلى واجهة برمجة التطبيقات الوطنية للقانون الكوري. يستخدم البرنامج اللغة البرمجية Python ومكتبات أخرى مثل BeautifulSoup و Pydantic و Uvicorn لتقديم واجهة قوية وفعالة لتطبيق API.

Novelty

3/10

Tags

legal-information korean-law national-api data-retrieval server

Technologies

beautifulsoup pydantic uvicorn

Claude Models

claude-opus-4.5 claude-opus-4.6 claude (unknown version)

Quality Score

C+
73.7/100
Structure
76
Code Quality
55
Documentation
95
Testing
60
Practices
76
Security
100
Dependencies
60

Strengths

  • Well-documented README with substantial content
  • Good test coverage (31% test-to-source ratio)
  • Code linting configured (ruff (possible))
  • Consistent naming conventions (snake_case)
  • Good security practices \u2014 no major issues detected
  • Containerized deployment (Docker)

Weaknesses

  • No LICENSE file \u2014 legal ambiguity for contributors
  • No CI/CD configuration \u2014 manual testing and deployment
  • 1840 duplicate lines detected \u2014 consider DRY refactoring
  • 1 'god files' with >500 LOC need decomposition

Recommendations

  • Set up CI/CD (GitHub Actions recommended) to automate testing and deployment
  • Add a LICENSE file (MIT recommended for open source)

Security & Health

4.3h
Tech Debt (A)
A
OWASP (100%)
PASS
Quality Gate
A
Risk (1)
Repobility · MCP-ready · https://repobility.com
Unknown
License
24.3%
Duplication
Full Security Report AI Fix Prompts SARIF SBOM

Languages

python
46.5%
markdown
33.6%
json
18.7%
shell
0.5%
toml
0.4%
yaml
0.4%

Frameworks

pytest

Concepts (2)

Page rendered by Aljefra Mapper · scored by Repobility (https://repobility.com)
CategoryNameDescriptionConfidence
Want this analysis on your repo? https://repobility.com/scan/
auto_descriptionProject Description🌐 Read this in other languages: English | 한국어 (Korean)80%
auto_categoryTestingtesting70%

Quality Timeline

1 quality score recorded.

View File Metrics

Embed Badge

Add to your README:

![Quality](https://repos.aljefra.com/badge/96867.svg)
Quality BadgeSecurity Badge
Export Quality CSVDownload SBOMExport Findings CSV