nrepl-connected live code evaluation with repair
Executes Clojure code directly against a running nREPL server with automatic error repair capabilities. Uses a multimethod-based tool system that sends code to the REPL, captures output/errors, and applies heuristic-based fixes (e.g., missing imports, syntax corrections) before re-evaluating. This enables AI assistants to iteratively refine code within the live development environment without round-tripping through file saves.
Unique: Implements bidirectional nREPL integration with automatic error repair heuristics, allowing AI to iteratively refine code within the live runtime context rather than treating evaluation as a one-shot operation. Uses multimethod dispatch to route tool calls directly to nREPL, enabling stateful evaluation across multiple tool invocations.
vs alternatives: Differs from static code analysis tools by operating on live runtime state; more powerful than generic REPL clients because it couples evaluation with AI-driven error recovery and repair suggestions.
file-aware code editing with s-expression replacement
Provides structured code editing via two complementary tools: clojure_edit for full-file transformations and clojure_edit_replace_sexp for surgical S-expression replacement. Uses tree-sitter or similar AST parsing to identify and replace specific S-expressions by pattern matching, preserving formatting and context. Integrates with file write safety checks to prevent accidental overwrites and validates syntax before persisting changes.
Unique: Combines full-file and S-expression-level editing via a unified multimethod interface, with safety checks that validate syntax and respect directory allowlists before persisting. Uses pattern-based S-expression matching to enable surgical edits without requiring full AST traversal.
vs alternatives: More precise than line-based editing because it understands Clojure's S-expression structure; safer than direct file overwrites because it validates syntax and enforces access control via configuration.
multi-tool orchestration via multimethod dispatch system
Implements a multimethod-based tool system where each tool registers implementations for five core multimethods: tool-name, tool-description, tool-input-schema, tool-execute, and tool-category. This architecture enables dynamic tool registration, composition, and execution without tight coupling between tools. Tools are discovered and invoked through a unified dispatch mechanism, allowing new tools to be added by implementing the multimethod interface.
Unique: Uses Clojure's multimethod system to enable dynamic tool registration and dispatch without requiring a central tool registry. Each tool is self-contained and implements a standard interface, allowing tools to be added/removed without modifying core server code.
vs alternatives: More extensible than hardcoded tool lists because new tools can be added by implementing the multimethod interface; more flexible than plugin systems because tools are first-class Clojure functions.
project structure inspection and analysis
Analyzes Clojure project structure by inspecting the file system, reading deps.edn/project.clj, and querying the nREPL for loaded namespaces and dependencies. Exposes project metadata including source paths, dependencies, and namespace topology through a structured inspection tool. Enables AI assistants to understand project layout and make context-aware decisions about code generation and refactoring.
Unique: Combines static file analysis (deps.edn parsing) with dynamic nREPL introspection to build a complete project context model. Uses multimethod dispatch to route inspection requests to both file system and REPL backends, providing a unified view of project structure.
vs alternatives: More comprehensive than static analysis alone because it includes runtime namespace state; more accurate than REPL-only inspection because it validates against declared dependencies in deps.edn.
configurable tool and prompt filtering with edn-based policy
Implements a configuration system that reads .clojure-mcp/config.edn files to selectively enable/disable tools, prompts, and resources at runtime. Uses a multimethod-based tool registration system where each tool is registered conditionally based on configuration predicates (tool-id-enabled?, prompt-name-enabled?, etc.). Supports directory allowlisting to restrict file system access and feature flags for bash execution and scratch pad persistence.
Unique: Uses EDN-based declarative configuration to filter tools at registration time, rather than applying runtime guards. Integrates with the multimethod tool system to conditionally register tools based on configuration predicates, enabling zero-overhead filtering for disabled tools.
vs alternatives: More flexible than hardcoded security policies because configuration is per-project; more efficient than runtime permission checks because filtering happens at tool registration, not invocation.
bash command execution with optional nrepl fallback
Executes shell commands via a bash tool that can route execution either directly to the OS shell or through nREPL's bash-over-nrepl capability (configurable via get-bash-over-nrepl). Captures stdout/stderr and exit codes, enabling AI assistants to run build tools, package managers, and system utilities. Respects directory allowlists to prevent arbitrary file system access.
Unique: Provides dual execution modes (native bash vs. nREPL-based) configurable per project, allowing flexibility in restricted environments. Integrates with the directory allowlist system to enforce file system access policies at the shell level.
vs alternatives: More flexible than pure Clojure evaluation because it can invoke external tools; safer than unrestricted shell access because it respects configuration-based allowlists and can be disabled entirely.
file system operations with pattern-based search and safety checks
Provides file read/write operations (read_file, file_write) with pattern-based search capabilities (grep, glob_files, LS). Uses ripgrep for efficient text search and respects directory allowlists to prevent unauthorized file access. Implements write safety checks to validate file paths and prevent overwrites of critical files. Supports reading files with pattern matching to extract specific sections.
Unique: Combines file I/O with pattern-based search via a unified tool interface, enforcing directory allowlists at the tool level rather than relying on OS-level permissions. Uses ripgrep for efficient text search while maintaining compatibility with fallback grep implementations.
vs alternatives: More efficient than naive file scanning because it uses ripgrep for search; safer than unrestricted file access because it validates paths against configuration allowlists before any operation.
mcp server lifecycle management with factory-based tool registration
Implements the core MCP server using a factory pattern where build-and-start-mcp-server coordinates startup with factory functions for tools, prompts, and resources. Uses the multimethod-based tool system to dynamically register tools at server initialization, with each tool implementing five core multimethods (tool-name, tool-description, tool-input-schema, tool-execute, etc.). Manages server lifecycle including initialization, tool registration, and shutdown.
Unique: Uses a factory pattern with multimethod dispatch to enable extensible tool registration without modifying core server code. Decouples tool implementation from server lifecycle, allowing tools to be added/removed via configuration and factory functions.
vs alternatives: More modular than monolithic server implementations because tools are registered via factories; more flexible than static tool lists because registration is driven by configuration and factory functions.
+3 more capabilities