Back to Home
1600822305 icon

APK-Editor-MCP-Server

by 1600822305

Overview

A powerful Android APK reverse engineering MCP server for decompiling, modifying, repackaging, and fast DEX memory editing of APK files.

Installation

Run Command
python mcp-server/run_server.py

Environment Variables

  • APKEDITOR_JAR
  • DEX_EDITOR_JAR
  • APK_WORKSPACE
  • JAVA_HOME
  • JADX_PATH
  • ANDROID_HOME
  • ANDROID_SDK_ROOT

Security Notes

The server uses subprocess calls extensively, which are generally handled safely by passing arguments as lists, mitigating direct shell injection. However, the `file_utils` functions (e.g., `file_read`, `file_write`, `file_delete`, `file_copy`, `file_move`, `file_patch`, `file_insert`) take arbitrary `file_path` or `dir_path` arguments. This design permits a malicious client (or an agent controlled by a malicious user) to read, write, or delete files anywhere on the host system where the server process has permissions. This represents a significant sandbox escape vulnerability. Additionally, regular expression-based operations (e.g., `fast_manifest_patch`, `search_text`) could be susceptible to ReDoS (Regular expression Denial of Service) if user-provided patterns are not properly validated or sanitized by the MCP client. The system relies on several external Java JARs (`APKEditor.jar`, `dex-editor.jar`, `jadx-core`) and system tools (`apksigner`, `adb`), whose security and integrity are critical. Hardcoded debug keystore credentials are used as a default, which is standard for Android development but highlights the potential for misuse if not understood by the user.

Similar Servers

Stats

Interest Score55
Security Score3
Cost ClassHigh
Avg Tokens8000
Stars1
Forks0
Last Update2025-12-11

Tags

Android Reverse EngineeringAPK ModificationSmali EditingDEX EditorADB Tools