Back to Home
BROKENISTXD icon

ilspy-mcp-server

by BROKENISTXD

Overview

Decompile and analyze .NET assemblies via a structured MCP server.

Installation

Run Command
python server.py

Security Notes

The server primarily executes `ilspycmd` on user-provided assembly files, which inherently carries risk when processing untrusted binaries. While `subprocess.run` is used with a list of arguments to mitigate direct shell injection, any vulnerability in `ilspycmd` itself could be exploited. Additionally, `pickle.load` is used for caching results, which poses a local deserialization risk if an attacker can manipulate the cache files on the filesystem. The server operates over stdio, avoiding direct network exposure, but a wrapper exposing it over a network would need its own security considerations. No hardcoded secrets were identified.

Similar Servers

Stats

Interest Score0
Security Score7
Cost ClassMedium
Stars0
Forks0
Last Update2025-12-13

Tags

Decompilation.NETAssembly AnalysisC#Reverse Engineering