Back to Home
th3w1zard1 icon

reverse-engineering-assistant

by th3w1zard1

Overview

Provides a Model Context Protocol (MCP) server to expose Ghidra's reverse engineering capabilities for automated binary analysis and interaction by AI models or external tools.

Installation

Run Command
python -m reva_cli

Environment Variables

  • GHIDRA_INSTALL_DIR
  • REVA_SERVER_USERNAME
  • REVA_AUTO_LABEL
  • REVA_SERVER_PORT
  • REVA_SERVER_HOST
  • REVA_API_KEY
  • REVA_API_KEY_ENABLED
  • REVA_DEBUG_MODE
  • REVA_REQUEST_LOGGING_ENABLED
  • REVA_MAX_DECOMPILER_SEARCH_FUNCTIONS
  • REVA_DECOMPILER_TIMEOUT_SECONDS
  • REVA_IMPORT_ANALYSIS_TIMEOUT_SECONDS
  • REVA_WAIT_FOR_ANALYSIS_ON_IMPORT
  • REVA_IMPORT_MAX_DEPTH

Security Notes

The server defaults to binding on all network interfaces (0.0.0.0) and has API Key authentication disabled by default. This creates a critical security vulnerability if run without explicit configuration to enable API keys and restrict network binding. It can perform extensive filesystem operations (importing, creating/deleting projects) and complex, resource-intensive analysis (decompilation) which could be exploited without proper access control. While internal Ghidra operations are wrapped in transactions and resource limits (like decompiler timeouts) are present, the default network exposure with no authentication is a major concern.

Similar Servers

Stats

Interest Score30
Security Score5
Cost ClassMedium
Avg Tokens10000
Stars1
Forks0
Last Update2026-01-16

Tags

Ghidrareverse-engineeringbinary-analysisMCPJavaheadlessPython-clientAPI