Back to Home
Hao17 icon

LiteGhidraMCP

Verified Safe

by Hao17

Overview

Provides AI systems programmatic access to Ghidra's reverse engineering capabilities via an HTTP JSON API.

Installation

Run Command
analyzeHeadless <projDir> <projName> -import <binary> -scriptPath . -postScript ghidra_mcp_server.py

Environment Variables

  • GHIDRA_MCP_HOST
  • GHIDRA_MCP_PORT
  • GHIDRA_MCP_SSE_PORT
  • GHIDRA_MCP_PYTHON

Security Notes

The server binds to localhost (127.0.0.1) by default, limiting network exposure. The use of `eval` in `api/demo.py` is contained within hardcoded, known strings, making it non-exploitable as implemented. `subprocess.Popen` is used to run an SSE proxy, which is a legitimate architectural pattern. The core functionality involves passing HTTP query parameters directly to Ghidra's Java APIs via Ghidrathon; the security relies heavily on the robustness of Ghidra's APIs against malicious input, which could potentially lead to crashes or unexpected behavior within the Ghidra environment. However, direct remote code execution on the underlying system is not an apparent risk due to these design choices.

Similar Servers

Stats

Interest Score0
Security Score7
Cost ClassMedium
Avg Tokens1500
Stars0
Forks0
Last Update2026-01-19

Tags

GhidraReverse EngineeringAI IntegrationBinary AnalysisMCP