Back to Home
Ahmeth4n icon

renef-mcp

Verified Safe

by Ahmeth4n

Overview

Provides a dynamic instrumentation toolkit for Android ARM64 applications, focused on native code analysis, runtime manipulation via Lua scripting, and security research.

Installation

Run Command
renef-mcp

Security Notes

This tool is inherently designed for dynamic instrumentation, process injection, and arbitrary code execution (Lua) on a target Android ARM64 device, which is a powerful capability. While the Python glue code utilizes secure subprocess execution methods (e.g., `asyncio.create_subprocess_exec` with argument lists to prevent shell injection) and does not contain obvious malicious patterns or hardcoded secrets within its own logic, the core function involves forwarding user-supplied commands and Lua scripts for execution on a connected device. If the MCP server itself is compromised, an attacker could leverage it for arbitrary code execution on the Android device. The overall security depends on trusting the underlying 'renef' binary, ADB, and the secure operation of the Android device.

Similar Servers

Stats

Interest Score42
Security Score7
Cost ClassMedium
Avg Tokens500
Stars1
Forks0
Last Update2025-12-13

Tags

AndroidReverse EngineeringDynamic AnalysisSecurity ResearchInstrumentationLua Scripting