reverse-engineering-assistant
Verified Safeby cyberkaida
Overview
Expose Ghidra's reverse engineering capabilities to AI models via a Model Context Protocol (MCP) server, primarily for headless integration and analysis.
Installation
reva-cliEnvironment Variables
- GHIDRA_INSTALL_DIR
Security Notes
The server includes explicit API key authentication, which significantly enhances security, especially when binding to non-localhost interfaces (configurable via 'SERVER_HOST'). Default API keys are UUID-generated, and debug mode is off by default. The core tools interact with Ghidra's internal APIs, which are powerful but constrained within the program's context. Potential risks include misconfiguration (e.g., weak API key, open host without auth) or vulnerabilities in Ghidra's underlying APIs.
Similar Servers
ida-pro-mcp
AI-powered reverse engineering assistant that bridges IDA Pro with language models through the Model Context Protocol (MCP).
gemini-mcp-tool
A Model Context Protocol (MCP) server that enables AI assistants to interact with the Google Gemini CLI for comprehensive code and file analysis, structured edit suggestions, and creative brainstorming.
GhidrAssistMCP
Enables AI assistants and other tools to interact with Ghidra's reverse engineering capabilities through a standardized Model Context Protocol (MCP) API.
jadx-mcp-server
Provides an MCP server for LLMs to perform automated Android APK reverse engineering, vulnerability analysis, and manifest parsing by interacting with a JADX-AI-MCP plugin.