Back to Home
sjkim1127 icon

Nexuscore_MCP

Verified Safe

by sjkim1127

Overview

An AI-driven server designed for dynamic malware analysis, enabling AI agents to interactively debug, inspect, and analyze evasive malware in real-time.

Installation

Run Command
.\target\release\nexuscore_mcp.exe

Environment Variables

  • VT_API_KEY
  • CAPE_API_URL
  • CAPE_API_TOKEN
  • RUST_LOG
  • SCYLLA_PATH

Security Notes

The core functionality involves injecting arbitrary JavaScript (Frida scripts) into target processes and executing external binaries (`cdb.exe`, `tshark`, `handle.exe`, `pe-sieve64.exe`, `procdump`, `ScyllaTest.exe`). The `install_hook` tool explicitly accepts arbitrary `js_code` from the AI agent. While essential for its purpose, this grants significant power to the AI, allowing it to execute arbitrary code within the sandboxed VM. The README strongly emphasizes running this server within an isolated Virtual Machine (Windows 10/11 x64) and running the AI client as Administrator for necessary permissions, which is critical to contain potential risks from analyzing malicious code or a compromised AI agent. No hardcoded secrets were found, and external tools are called safely via `tokio::process::Command::arg()` to prevent shell injection.

Similar Servers

Stats

Interest Score37
Security Score6
Cost ClassMedium
Avg Tokens750
Stars5
Forks0
Last Update2026-01-13

Tags

Malware AnalysisDynamic AnalysisAI Agent ToolFridaReverse Engineering