Back to Home
zinja-coder icon

jadx-ai-mcp

by zinja-coder

Overview

Integrates JADX decompiler with LLMs via Model Context Protocol for AI-powered Android APK analysis and reverse engineering.

Installation

Run Command
No command provided

Security Notes

The server, implemented using Javalin, defaults to binding to all network interfaces (0.0.0.0) when `app.start(currentPort)` is called. This exposes all JADX functionalities, including sensitive operations like decompilation, renaming, and debugger access, to any device on the network without any authentication or access control. This is a critical security risk, especially when analyzing potentially malicious APKs. Input validation for query parameters is present for basic checks (e.g., null/empty, number format) but does not include comprehensive sanitization against maliciously crafted strings that could potentially exploit JADX internals or cause unexpected behavior.

Similar Servers

Stats

Interest Score98
Security Score3
Cost ClassHigh
Avg Tokens150000
Stars726
Forks91
Last Update2025-12-06

Tags

AndroidReverse EngineeringDecompilerAILLM