Ida Pro MCP
CautionMCP server for IDA Pro, allowing you to perform binary analysis with AI assistants. This plugin implement decompilation, disassembly and allows you to generate malware analysis reports automatically.
Install
No auto-install command available for this server.
Check the GitHub repository for setup instructionsSafety Report
details
py_eval tool allows arbitrary Python execution inside IDA Pro; no authentication on the MCP endpoint
details
Local stdio or local HTTP transport; no web CORS surface
details
No rate limiting; py_eval enables unrestricted code execution in the IDA context
details
No known CVEs for the MCP plugin; py_eval is a significant capability that must be used carefully
details
Python plugin; minimal external dependencies. No published audit
details
Dangerous patterns detected: eval_call
details
License not explicitly stated in the README; verify before commercial use
details
Open source at github.com/mrexodia/ida-pro-mcp; license not explicitly documented in README
details
Actively maintained; installable from GitHub main branch
Compatibility
Tools Provided (25)
lookup_funcs Retrieve functions by address or name
int_convert Convert numbers between formats (decimal, hex, bytes, ASCII, binary)
list_funcs List functions with pagination and optional filtering
list_globals List global variables with pagination
imports List imported symbols with their module names
decompile Decompile a function at the specified address using the Hex-Rays decompiler
disasm Disassemble a function with full details
xrefs_to Get cross-references to one or more addresses
xrefs_to_field Get cross-references to a struct field
callees Get functions called by the specified function(s)
set_comments Add comments in both disassembly and decompiler views
patch_asm Patch assembly instructions at a given address
declare_type Declare C type(s) in the IDA type library
define_func Define a function at one or more addresses
define_code Convert raw bytes to code instructions
undefine Undefine item(s), converting them back to raw bytes
get_bytes Read raw bytes from a specified address
get_string Read a string from a specified address
stack_frame Get the stack frame layout for a function
py_eval Execute arbitrary Python code in the IDA Pro context (powerful but use with caution)
analyze_funcs Run comprehensive analysis on one or more functions
find_regex Search for patterns matching a regular expression in the binary
find_bytes Search for a specific byte sequence in the binary
basic_blocks Get the basic block structure of a function
callgraph Generate a call graph for the specified function
Frequently Asked Questions
What is Ida Pro MCP?
MCP server for IDA Pro, allowing you to perform binary analysis with AI assistants. This plugin implement decompilation, disassembly and allows you to generate malware analysis reports automatically.
What tools does Ida Pro MCP provide?
Ida Pro MCP provides 25 tools including lookup_funcs, int_convert, list_funcs, list_globals. Each tool can be called by AI agents to perform specific operations.
Is Ida Pro MCP safe to use?
Ida Pro MCP is rated Caution. Some security checks raised warnings. Review the safety report on this page for details before use.
What are alternatives to Ida Pro MCP?
Similar MCP servers include GhidraMCP, Beelzebub, Jadx AI MCP. Each serves a similar purpose but may differ in features, language, and compatibility.
Similar MCP Servers
GhidraMCP
UntestedA Model Context Protocol server for Ghidra that enables LLMs to autonomously reverse engineer applications. Provides tools for decompiling binaries, renaming methods and data, and listing methods, classes, imports, and exports.
Beelzebub
VerifiedBeelzebub is a honeypot framework that lets you build honeypot tools using MCP. Its purpose is to detect prompt injection or malicious agent behavior. The underlying idea is to provide the agent with tools it would never use in its normal work.
Jadx AI MCP
CautionJADX-AI-MCP is a plugin and MCP Server for the JADX decompiler that integrates directly with Model Context Protocol (MCP) to provide live reverse engineering support with LLMs like Claude.