Back to Home

dJEB_mcp_server

Verified Safe

by dPhoeniixx

Overview

Bridges Claude Desktop with JEB decompiler for AI-assisted Android APK reverse engineering workflows, enabling advanced analysis directly within Claude.

Installation

Run Command
No command provided

Security Notes

The system involves running a script within JEB that exposes its API over a local socket to Claude Desktop via a Python bridge. While the connection is local (port 8851), exposing a powerful decompiler API to an AI client means that malicious or unexpected prompts could potentially trigger unintended actions through the JEB API. No explicit 'eval' is mentioned, but the nature of directly invoking decompiler functionality based on AI instructions requires trust in both the AI's understanding and the tool's input sanitization. Generally safe when used as intended by a knowledgeable user.

Similar Servers

Stats

Interest Score0
Security Score7
Cost ClassHigh
Avg Tokens10000
Stars0
Forks0
Last Update2025-11-17

Tags

Android AnalysisReverse EngineeringAI-assistedJEB DecompilerClaude Desktop