jadx-ai-mcp
MCP ServerFreePlugin for JADX to integrate MCP server
Capabilities12 decomposed
mcp-bridged cross-reference tracking for decompiled android code
Medium confidenceExposes JADX's internal call graph and xref (cross-reference) APIs through MCP tool calls, enabling LLMs to follow method invocations and field accesses across the entire decompiled codebase. The JADX-MCP-Server translates incoming MCP requests into HTTP calls to the plugin's /xref endpoint, which queries JADX's JavaClass entity relationships and returns structured call chains. This allows AI models to understand data flow and dependency graphs without manual navigation.
Integrates JADX's native JavaClass entity xref APIs directly into MCP tool calls, providing real-time call graph traversal without requiring separate graph indexing or external analysis tools. The HTTP bridge pattern allows stateless queries against the running JADX instance.
More accurate than regex-based xref tools because it uses JADX's semantic AST analysis; faster than manual code review because the AI can recursively follow chains in seconds rather than hours.
android resource inspection and manifest analysis via mcp
Medium confidenceExposes AndroidManifest.xml, strings.xml, layout files, and other Android resources through MCP tools that parse and return structured data about app permissions, entry points, and UI definitions. The JADX plugin extracts these resources from the APK's resource directory and serves them as JSON via HTTP endpoints, which the MCP server translates into tool responses. This enables LLMs to understand app capabilities, permissions, and potential attack surfaces without manual XML parsing.
Directly parses Android binary resource formats (compiled XML, resource tables) from the APK using JADX's resource extraction APIs, returning structured JSON instead of raw binary data. Avoids the need for separate tools like aapt or apktool.
Faster than running aapt or apktool separately because resources are already extracted in JADX's memory; more integrated than web-based APK analyzers because it works offline within the reverse engineer's local environment.
method source code retrieval with line number mapping
Medium confidenceRetrieves the complete source code of a specific method from the decompiled APK, including line numbers, parameter definitions, and return type information. The JADX plugin queries its JavaClass model to extract the method's source code and maps it back to the original line numbers in the decompiled file. This enables LLMs to analyze method implementations in detail and correlate them with other analysis results (e.g., xrefs, stack traces).
Extracts method source code directly from JADX's decompiled AST and maps it to line numbers in the decompiled file, enabling precise correlation with other analysis results. This is more accurate than string-based extraction because it uses semantic information.
More accurate than manual code review because it retrieves the exact decompiled source; more useful than class-level analysis because it focuses on specific method implementations.
apk metadata and configuration analysis with build information extraction
Medium confidenceExtracts APK-level metadata including version information, build configuration, certificate details, and other manifest-level data. The JADX plugin accesses the APK's metadata through its resource extraction APIs and returns structured information about the app's build, signing, and configuration. This enables LLMs to understand the app's provenance, versioning, and build-time configuration without manual APK inspection.
Extracts APK metadata directly from the binary manifest and certificate structures using JADX's resource parsing, providing structured data without requiring separate tools like aapt or keytool.
More convenient than running aapt or keytool separately because metadata is extracted in-process; more integrated than web-based APK analyzers because it works offline.
smali bytecode access and analysis for obfuscated code
Medium confidenceProvides direct access to Smali (Android bytecode) representations of methods when Java decompilation is incomplete, obfuscated, or fails. The JADX plugin exposes a /smali endpoint that returns the low-level bytecode instructions for a given method, allowing LLMs to analyze register operations, control flow, and API calls at the bytecode level. This is critical for analyzing heavily obfuscated or packed APKs where Java decompilation produces unreadable output.
Leverages JADX's built-in Smali generation engine (which reconstructs bytecode from the decompiled AST) to provide bytecode views without requiring separate apktool or baksmali invocations. Integrates seamlessly with the decompilation pipeline.
More accurate than standalone Smali tools because it uses JADX's semantic understanding of the code; more convenient than manual apktool extraction because Smali is generated on-demand through MCP.
automated vulnerability detection and sast recommendations via llm analysis
Medium confidenceOrchestrates a workflow where the MCP server provides the LLM with code snippets, resource data, and xref information, enabling the AI to perform Static Application Security Testing (SAST) by identifying insecure API usage, hardcoded secrets, and vulnerable patterns. The system does not perform hardcoded pattern matching; instead, it gives the LLM full context (source code, permissions, entry points) and relies on the model's reasoning to identify vulnerabilities. This leverages the LLM's semantic understanding of security rather than regex-based rules.
Delegates vulnerability detection to the LLM's semantic reasoning rather than using hardcoded SAST rules. The system provides rich context (code, resources, xrefs) and lets the AI identify vulnerabilities based on understanding of security principles, enabling detection of novel or context-specific issues that rule-based tools miss.
More flexible than traditional SAST tools (Checkmarx, Fortify) because it adapts to new vulnerability patterns without rule updates; more accurate than simple pattern matching because it understands code semantics and context.
intelligent class and method renaming with obfuscation reversal
Medium confidenceEnables the LLM to suggest and execute renames for obfuscated classes, methods, and variables based on semantic analysis of their usage patterns and functionality. The MCP server provides a rename tool that the LLM can invoke with a class/method name and a suggested meaningful name; the JADX plugin applies the rename through its refactoring API and persists it to the project. This transforms obfuscated identifiers (e.g., class 'a', method 'b') into human-readable names (e.g., 'NetworkManager', 'sendAuthToken') based on AI reasoning about their purpose.
Integrates JADX's native refactoring engine with LLM-driven semantic analysis, allowing the AI to propose renames based on code behavior rather than pattern matching. The rename operation is atomic and updates all xrefs in the project automatically.
More intelligent than automated deobfuscation tools (which use heuristics like string analysis) because it leverages the LLM's understanding of code semantics and context; more practical than manual renaming because the AI can suggest names for hundreds of obfuscated identifiers in seconds.
http-to-mcp protocol translation with stateless tool invocation
Medium confidenceThe JADX-MCP-Server (Python, built on FastMCP) acts as a protocol adapter that translates incoming MCP tool calls (JSON-RPC format) from LLM clients into HTTP requests to the JADX plugin's internal HTTP server (port 8650). Each tool call is stateless: the server extracts parameters, constructs an HTTP request, waits for the response, and returns the result to the LLM. This decouples the LLM client from the JADX plugin, allowing multiple clients to connect to the same plugin instance and enabling integration with any MCP-compatible LLM client.
Uses FastMCP framework to implement a lightweight protocol translator that converts MCP tool calls to HTTP without maintaining state or session context. The stateless design allows multiple concurrent clients and simplifies deployment.
More flexible than direct JADX API integration because it decouples clients from the plugin; more standardized than custom HTTP clients because it uses the MCP protocol, enabling compatibility with any MCP-aware LLM client.
codebase-aware code search with keyword and semantic filtering
Medium confidenceProvides MCP tools for searching the decompiled APK by class name, method name, or code content using keyword matching. The JADX plugin exposes /search endpoints that query its internal class index and source code, returning matching classes, methods, and code snippets. The search supports filtering by package, access modifiers, and other metadata. This enables LLMs to locate relevant code without manual navigation through the class hierarchy.
Leverages JADX's in-memory class index and source code cache to provide instant search results without requiring external indexing tools. Search is performed against the decompiled AST, enabling accurate filtering by code structure (e.g., method signatures, access modifiers).
Faster than grep-based search because it uses semantic indexing; more accurate than regex search because it understands code structure; more integrated than external search tools because it works directly on JADX's decompiled output.
runtime debugging context integration with stack trace analysis
Medium confidenceDuring active JADX debugging sessions, the MCP server can access runtime context including variable values, stack traces, and breakpoint information through JADX's debugging APIs. The system exposes tools that allow LLMs to inspect the current execution state, analyze stack frames, and correlate runtime behavior with static code analysis. This bridges the gap between static analysis and runtime behavior, enabling the AI to understand how code executes in practice.
Integrates JADX's native debugging APIs with MCP tool calls, allowing LLMs to inspect runtime state without requiring separate debugging tools or manual log analysis. The system correlates runtime values with static code to provide holistic analysis.
More integrated than external debuggers (Android Studio, gdb) because it works within JADX's environment; more useful than static analysis alone because it provides runtime context that reveals actual behavior.
multi-language class structure extraction with metadata preservation
Medium confidenceExtracts complete class definitions including fields, methods, constructors, annotations, and inheritance relationships from decompiled Java code. The JADX plugin uses its JavaClass entity model to serialize class metadata as structured JSON, including method signatures, return types, parameter types, access modifiers, and annotations. This enables LLMs to understand class architecture without reading raw source code and to reason about type safety and API contracts.
Uses JADX's JavaClass entity model to extract metadata directly from the decompiled AST, preserving type information and structural relationships. This is more accurate than parsing source code strings because it uses semantic information.
More accurate than regex-based parsing because it uses JADX's AST; more complete than javadoc extraction because it includes all metadata including private members and annotations.
distributed architecture with plugin-server separation for scalability
Medium confidenceThe system is architected as two independent components: the JADX-AI-MCP Plugin (Java, runs within JADX GUI) and the JADX-MCP-Server (Python, standalone process). The plugin exposes an HTTP API on port 8650; the server translates MCP calls to HTTP requests. This separation enables multiple MCP clients to connect to a single JADX instance, allows the server to run on a different machine, and decouples plugin updates from server updates. The architecture supports horizontal scaling by running multiple servers against the same plugin.
Separates the JADX plugin (Java) from the MCP server (Python) to enable language-agnostic client integration and independent scaling. The HTTP bridge pattern allows the server to be stateless and horizontally scalable.
More flexible than monolithic JADX plugins because it decouples the analysis engine from the protocol layer; more scalable than direct API integration because multiple servers can share a single plugin instance.
Capabilities are decomposed by AI analysis. Each maps to specific user intents and improves with match feedback.
Related Artifactssharing capabilities
Artifacts that share capabilities with jadx-ai-mcp, ranked by overlap. Discovered automatically through the match graph.
apktool-mcp-server
A MCP Server for APK Tool (Part of Android Reverse Engineering MCP Suites)
ida-pro-mcp
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
ida-pro-mcp
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
@modelcontextprotocol/inspector
Model Context Protocol inspector
mcp-code-todo
MCP Server tool to scan code for TODOs in codebases.
LiteMCP
** - A TypeScript framework for building MCP servers elegantly
Best For
- ✓Security researchers performing SAST (Static Application Security Testing) on Android apps
- ✓Reverse engineers analyzing obfuscated code to understand control flow
- ✓Penetration testers identifying vulnerability chains across multiple classes
- ✓Security auditors checking for overprivileged permissions or exposed components
- ✓Reverse engineers understanding app architecture and entry points
- ✓Compliance teams verifying app behavior against security policies
- ✓Reverse engineers analyzing method implementations in detail
- ✓Security researchers examining suspicious method logic
Known Limitations
- ⚠Xref tracking is limited to decompiled Java code; Smali bytecode xrefs require separate analysis
- ⚠Performance degrades on very large APKs (>100MB) due to full graph traversal
- ⚠Cannot track dynamic method invocation via reflection without additional runtime instrumentation
- ⚠Obfuscated or encrypted resources may not be parseable; requires manual decryption
- ⚠Layout files are returned as raw XML; no visual rendering or UI tree analysis
- ⚠Resource IDs are numeric; string resolution requires cross-referencing with strings.xml
Requirements
Input / Output
UnfragileRank
UnfragileRank is computed from adoption signals, documentation quality, ecosystem connectivity, match graph feedback, and freshness. No artifact can pay for a higher rank.
Repository Details
Last commit: Apr 20, 2026
About
Plugin for JADX to integrate MCP server
Categories
Alternatives to jadx-ai-mcp
Are you the builder of jadx-ai-mcp?
Claim this artifact to get a verified badge, access match analytics, see which intents users search for, and manage your listing.
Get the weekly brief
New tools, rising stars, and what's actually worth your time. No spam.
Data Sources
Looking for something else?
Search →