Back to Home
wrlu icon

jadx-daemon-mcp

by wrlu

Overview

Decompile and analyze Android application binaries (APKs, DEX, JAR) by exposing a programmatic HTTP API.

Installation

Run Command
python3 jadx-daemon-mcp/server.py

Environment Variables

  • JADX_DAEMON_MCP_HOST
  • JADX_DAEMON_MCP_PORT

Security Notes

The server lacks authentication, allowing any client with network access to invoke its APIs. It accepts file paths (`filePath`, `dirPath`) directly from user-controlled query parameters, posing a significant risk of arbitrary file loading or path traversal. This could lead to information disclosure from the server's filesystem or potential exploitation through malformed input files processed by the underlying Jadx library. While the Java daemon defaults to binding on 'localhost', a misconfiguration of 'JADX_DAEMON_MCP_HOST' could expose it externally without any access controls.

Similar Servers

Stats

Interest Score16
Security Score3
Cost ClassHigh
Avg Tokens100000
Stars4
Forks1
Last Update2025-12-20

Tags

AndroidDecompilationReverse EngineeringStatic AnalysisJava