diff --git a/src/core/tools/code-metrics.xml b/src/core/tools/code-metrics.xml
new file mode 100644
index 00000000..ed31c137
--- /dev/null
+++ b/src/core/tools/code-metrics.xml
@@ -0,0 +1,111 @@
+
+
+ Analyze codebase for size, complexity, and quality metrics
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Find all files matching include patterns
+ Exclude directories from exclude list
+ Build file list for analysis
+
+
+
+ For each file, count total, code, blank, comment lines
+ Aggregate totals by file type
+
+
+
+ Parse functions/methods in each file
+ Calculate cyclomatic complexity per function
+ Identify deeply nested code blocks
+
+
+
+ Detect duplicate code blocks
+ Find long functions (> 50 lines)
+ Find large files (> 500 lines)
+ Count TODO/FIXME comments
+
+
+
+ Format metrics according to output parameter
+ Include recommendations for concerning metrics
+
+
+
+
+
diff --git a/src/core/tools/context-extractor.xml b/src/core/tools/context-extractor.xml
new file mode 100644
index 00000000..498d5362
--- /dev/null
+++ b/src/core/tools/context-extractor.xml
@@ -0,0 +1,123 @@
+
+
diff --git a/src/core/tools/dependency-check.xml b/src/core/tools/dependency-check.xml
new file mode 100644
index 00000000..77718755
--- /dev/null
+++ b/src/core/tools/dependency-check.xml
@@ -0,0 +1,68 @@
+
+
+ Scan project dependencies for outdated packages and known vulnerabilities
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Scan {path} for package manager files
+ Identify primary package manager from detected files
+ Report: "No supported package manager detected"
+
+
+
+ Execute audit command for detected package manager
+ Capture stdout and stderr
+ Parse output for vulnerabilities
+
+
+
+ Run outdated check command (e.g., npm outdated, pip list --outdated)
+ Parse output for package versions
+
+
+
+ Filter by severity_threshold
+ Format output according to output_format
+
+
+
+
+ ```
+ Dependency Check Report
+ =======================
+ Project: {project_name}
+ Package Manager: {package_manager}
+ Date: {date}
+
+ Vulnerabilities:
+ - Critical: {critical_count}
+ - High: {high_count}
+ - Medium: {medium_count}
+ - Low: {low_count}
+
+ Outdated Packages: {outdated_count}
+
+ Top Issues:
+ 1. {top_issue_1}
+ 2. {top_issue_2}
+ 3. {top_issue_3}
+ ```
+
+
diff --git a/src/core/tools/schema-validator.xml b/src/core/tools/schema-validator.xml
new file mode 100644
index 00000000..a78d4518
--- /dev/null
+++ b/src/core/tools/schema-validator.xml
@@ -0,0 +1,81 @@
+
+
+ Validate JSON/YAML files against schemas (JSON Schema, OpenAPI, etc.)
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Read file content
+ Detect file format (JSON or YAML)
+ Parse content into object
+ Return: "Syntax error: {error_message}"
+
+
+
+
+ Check for $schema property (JSON Schema)
+ Check for openapi property (OpenAPI)
+ Check for asyncapi property (AsyncAPI)
+ Default to json-schema if detected
+
+
+
+
+
+ Load schema from {schema} path
+
+
+ Use built-in schema for detected type
+
+
+
+
+ Run validation against schema
+ Collect all validation errors
+ Format error messages with line numbers (if possible)
+
+
+
+ Return: "Valid {schema_type} document"
+ Return: "Validation errors: {errors}"
+
+
+
+
+