ida-pro-mcp
by mrexodia
Overview
This project provides an MCP (Model Context Protocol) server that integrates with IDA Pro, enabling AI assistants to perform reverse engineering tasks like binary analysis, decompilation, memory manipulation, and debugging within the IDA Pro environment.
Installation
uv run ida-pro-mcp --transport http://127.0.0.1:8744/sseEnvironment Variables
- IDA_MCP_ANALYSIS_PROMPT
- VIRTUAL_ENV
- PYTHONHOME
- PYTHONPATH
- PYTHONSAFEPATH
- PYTHONPLATLIBDIR
- PYTHONPYCACHEPREFIX
- PYTHONNOUSERSITE
- PYTHONUSERBASE
- IDA_MCP_URL
- IDA_MCP_TOOL_TIMEOUT_SEC
- IDA_MCP_LOG_REQUESTS
- IDA_MCP_LOG_SKIP_METHODS
Security Notes
The project includes a `py_eval` tool which allows arbitrary Python code execution (`eval` and `exec`) within the IDA Pro context. This is a severe remote code execution (RCE) vulnerability if the server is exposed to untrusted clients or if the `--unsafe` flag is used. While this tool is marked `@unsafe` and can be managed via a web-based configuration page, its presence significantly lowers the security posture. Default binding to `127.0.0.1` limits direct external network exposure, but CORS policies can be made 'unrestricted'.
Similar Servers
cclsp
Integrate LLM-based coding agents with Language Server Protocol (LSP) servers to enable robust code navigation, symbol resolution, and refactoring across various programming languages.
reverse-engineering-assistant
Provides an MCP (Model Context Protocol) server to expose Ghidra's reverse engineering capabilities for AI models and automated binary analysis in a headless environment.
GhidrAssistMCP
This Ghidra extension provides an MCP server, enabling AI assistants and other tools to interact with Ghidra's reverse engineering capabilities through a standardized API, supporting program analysis, modification, and navigation.
jadx-mcp-server
Facilitates live, LLM-driven reverse engineering and vulnerability analysis of Android APKs by integrating JADX with the Model Context Protocol.