home / mcp / apk security mcp server
Provides multi-tool APK security analysis via MCP endpoints for JEB, JADX, APKTool, FlowDroid, and MobSF.
Configuration
View docs{
"mcpServers": {
"cc-apk-apk-security-guard-mcp-suite": {
"url": "http://localhost:16161",
"headers": {
"JAVA_HOME": "/path/to/java_home",
"MOBSF_URL": "http://localhost:8000",
"MOBSF_API_KEY": "your_api_key_here",
"FLOWDROID_JAR_PATH": "/path/to/flowdroid.jar",
"FLOWDROID_WORKSPACE": "flowdroid_workspace"
}
}
}
}This MCP Server consolidates multiple APK security analysis tools into a shared, scriptable interface. You can run independent analyses with JEB, JADX, APKTool, FlowDroid, and MobSF, then combine results into a comprehensive vulnerability report. This approach increases coverage, speeds up investigations, and lets you orchestrate security checks from a single client or editor integration.
You interact with the server through an MCP client that can start, query, and manage the 5 integrated analysis tools. For a given APK, you can request static decompilation data, manifest details, decompiled source, taint analysis results, and security reports. The client can also request combined results to prioritize high-frequency findings across tools, enabling you to focus on the most credible issues.
Prerequisites: you need Node.js and Python installed on your machine, plus any runtime environments required by the individual MCP tools.
Install dependencies and set up the MobSF integration, then install the specific MCP components to enable local servers for each tool.
Follow these concrete steps to get started with the server locally:
Configuration and environment notes are shown below. These blocks pull from the built-in MCP configurations for the JEB, JADX, FlowDroid, and MobSF integrations. Start each local MCP server according to its documented command, then point the MCP client at the appropriate endpoints.
JEB-based MCP endpoint offering manifest, decompiled code, and analysis utilities for APKs.
JADX MCP endpoint providing class listings, decompiled sources, and code exploration APIs.
APKTool-based MCP endpoints for decoding, rebuilding, and resource inspection.
MobSF-based MCP endpoints for uploading apps, retrieving scans, and accessing detailed report sections.
FlowDroid MCP endpoint for taint analysis and extraction of sources/sinks.