ilspy-mcp-server
by BROKENISTXD
Overview
Decompile and analyze .NET assemblies via a structured MCP server.
Installation
python server.pySecurity Notes
The server primarily executes `ilspycmd` on user-provided assembly files, which inherently carries risk when processing untrusted binaries. While `subprocess.run` is used with a list of arguments to mitigate direct shell injection, any vulnerability in `ilspycmd` itself could be exploited. Additionally, `pickle.load` is used for caching results, which poses a local deserialization risk if an attacker can manipulate the cache files on the filesystem. The server operates over stdio, avoiding direct network exposure, but a wrapper exposing it over a network would need its own security considerations. No hardcoded secrets were identified.
Similar Servers
easy-code-reader
Provides a Model Context Protocol (MCP) server for AI assistants to intelligently read Java source code from local projects and Maven dependencies, supporting decompilation and multi-module analysis.
TriageMCP
Enables an LLM to perform static analysis and triage of PE files using local security tools.
Reversecore_MCP
Provides a Micro-Agent Control Protocol (MCP) server that wraps various reverse engineering CLI tools and libraries, enabling AI agents to perform binary analysis, malware analysis, and vulnerability research through natural language commands.
ida_domain_mcp
A headless IDA Pro server for remote, programmatic binary analysis and reverse engineering via the Model Context Protocol (MCP).