dJEB_mcp_server
Verified Safeby dPhoeniixx
Overview
Bridges Claude Desktop with JEB decompiler for AI-assisted Android APK reverse engineering workflows, enabling advanced analysis directly within Claude.
Installation
No command providedSecurity Notes
The system involves running a script within JEB that exposes its API over a local socket to Claude Desktop via a Python bridge. While the connection is local (port 8851), exposing a powerful decompiler API to an AI client means that malicious or unexpected prompts could potentially trigger unintended actions through the JEB API. No explicit 'eval' is mentioned, but the nature of directly invoking decompiler functionality based on AI instructions requires trust in both the AI's understanding and the tool's input sanitization. Generally safe when used as intended by a knowledgeable user.
Similar Servers
DesktopCommanderMCP
This server empowers AI agents to search, update, manage files, and execute terminal commands on a local or containerized desktop environment. It provides enhanced filesystem operations, process control, and data analysis capabilities with support for various file types like text, Excel, and PDF.
jadx-ai-mcp
Integrates an LLM with JADX decompiler to analyze Android APKs, uncover vulnerabilities, and assist in reverse engineering through a Model Context Protocol (MCP) server.
jadx-mcp-server
Facilitates live, LLM-driven reverse engineering and vulnerability analysis of Android APKs by integrating JADX with the Model Context Protocol.
ast-mcp-server
Provides an MCP (Model Context Protocol) server for code structure and semantic analysis using ASTs and ASGs, integrated with external AI clients like Claude Desktop.