LiteGhidraMCP
Verified Safeby Hao17
Overview
Provides AI systems programmatic access to Ghidra's reverse engineering capabilities via an HTTP JSON API.
Installation
analyzeHeadless <projDir> <projName> -import <binary> -scriptPath . -postScript ghidra_mcp_server.pyEnvironment Variables
- GHIDRA_MCP_HOST
- GHIDRA_MCP_PORT
- GHIDRA_MCP_SSE_PORT
- GHIDRA_MCP_PYTHON
Security Notes
The server binds to localhost (127.0.0.1) by default, limiting network exposure. The use of `eval` in `api/demo.py` is contained within hardcoded, known strings, making it non-exploitable as implemented. `subprocess.Popen` is used to run an SSE proxy, which is a legitimate architectural pattern. The core functionality involves passing HTTP query parameters directly to Ghidra's Java APIs via Ghidrathon; the security relies heavily on the robustness of Ghidra's APIs against malicious input, which could potentially lead to crashes or unexpected behavior within the Ghidra environment. However, direct remote code execution on the underlying system is not an apparent risk due to these design choices.
Similar Servers
ida-pro-mcp
This project provides an MCP (Model Context Protocol) server that integrates with IDA Pro, enabling AI assistants to perform reverse engineering tasks like binary analysis, decompilation, memory manipulation, and debugging within the IDA Pro environment.
reverse-engineering-assistant
Provides an MCP (Model Context Protocol) server to expose Ghidra's reverse engineering capabilities for AI models and automated binary analysis in a headless environment.
GhidrAssistMCP
This Ghidra extension provides an MCP server, enabling AI assistants and other tools to interact with Ghidra's reverse engineering capabilities through a standardized API, supporting program analysis, modification, and navigation.
jadx-mcp-server
Facilitates live, LLM-driven reverse engineering and vulnerability analysis of Android APKs by integrating JADX with the Model Context Protocol.