renef-mcp
Verified Safeby Ahmeth4n
Overview
Provides a dynamic instrumentation toolkit for Android ARM64 applications, focused on native code analysis, runtime manipulation via Lua scripting, and security research.
Installation
renef-mcpSecurity Notes
This tool is inherently designed for dynamic instrumentation, process injection, and arbitrary code execution (Lua) on a target Android ARM64 device, which is a powerful capability. While the Python glue code utilizes secure subprocess execution methods (e.g., `asyncio.create_subprocess_exec` with argument lists to prevent shell injection) and does not contain obvious malicious patterns or hardcoded secrets within its own logic, the core function involves forwarding user-supplied commands and Lua scripts for execution on a connected device. If the MCP server itself is compromised, an attacker could leverage it for arbitrary code execution on the Android device. The overall security depends on trusting the underlying 'renef' binary, ADB, and the secure operation of the Android device.
Similar Servers
inspector
A UI client for inspecting and interacting with Model Context Protocol (MCP) servers, allowing users to view resources, prompts, tools, manage connections, configure authentication (OAuth), and debug server interactions.
lamda
AI-powered Android automation framework for mobile data and task automation.
jadx-ai-mcp
Facilitates AI-powered analysis of Android APKs within JADX for vulnerability assessment and reverse engineering via Model Context Protocol (MCP).
jadx-mcp-server
Provides an MCP server for LLMs to perform automated Android APK reverse engineering, vulnerability analysis, and manifest parsing by interacting with a JADX-AI-MCP plugin.