ida_domain_mcp
by xxyyue
Overview
A headless IDA Pro server for remote, programmatic binary analysis and reverse engineering via the Model Context Protocol (MCP).
Installation
uvx ida-domain-mcp --transport http://127.0.0.1:8744Environment Variables
- IDADIR
Security Notes
The `py_eval` tool allows execution of arbitrary Python code within the IDA context. While intended as a powerful feature for analysis agents, this is a critical security risk if the server is exposed to untrusted input or if not run in a strictly isolated and trusted environment. The server can also be configured to listen over HTTP/SSE, which introduces network-based attack vectors if not properly secured with authentication and authorization. No apparent hardcoded secrets in the server's own code.
Similar Servers
ida-pro-mcp
This project provides an MCP (Model Context Protocol) server that integrates with IDA Pro, enabling AI assistants to perform reverse engineering tasks like binary analysis, decompilation, memory manipulation, and debugging within the IDA Pro environment.
reverse-engineering-assistant
Provides an MCP (Model Context Protocol) server to expose Ghidra's reverse engineering capabilities for AI models and automated binary analysis in a headless environment.
GhidrAssistMCP
This Ghidra extension provides an MCP server, enabling AI assistants and other tools to interact with Ghidra's reverse engineering capabilities through a standardized API, supporting program analysis, modification, and navigation.
jadx-mcp-server
Facilitates live, LLM-driven reverse engineering and vulnerability analysis of Android APKs by integrating JADX with the Model Context Protocol.