Back to Home
zinja-coder icon

jadx-ai-mcp

Verified Safe

by zinja-coder

Overview

Integrates an LLM with JADX decompiler to analyze Android APKs, uncover vulnerabilities, and assist in reverse engineering through a Model Context Protocol (MCP) server.

Installation

Run Command
uv run jadx_mcp_server.py

Security Notes

The server runs as a JADX plugin and binds strictly to localhost (127.0.0.1), significantly limiting network attack surface. It relies on OS-level user isolation for security, with no built-in authentication for the local HTTP API. The DebugRoutes utilize Java reflection to access private GUI components, which can be fragile to JADX internal changes and poses a minor risk if an attacker could manipulate the reflection calls (though contained by local binding). Refactoring routes apply user-intended changes to the decompiled project model. Overall, for its intended local, user-controlled operation, it is reasonably secure.

Similar Servers

Stats

Interest Score98
Security Score8
Cost ClassMedium
Avg Tokens2000
Stars1085
Forks117
Last Update2026-01-08

Tags

Android Reverse EngineeringAPK AnalysisVulnerability DetectionLLM IntegrationJADX Plugin