Skip to main content

MCP server giving AI agents eyes and hands inside Android devices via ADB

Project description

Python 3.11+ License MIT MCP Compatible PyPI MCP Registry

Agent Droid Bridge

Agent Droid Bridge is an MCP server that connects AI agents to Android devices and emulators over ADB. It is built for mobile automation, app testing, dynamic analysis, and reverse engineering: exposing the full surface of ADB as structured tools that any MCP-compatible AI client can call directly. If ADB can do it, an agent can do it.


⭐ If you like the project, a star helps others find it. ⭐


Note: Purpose-built tools return structured, minimal responses instead of raw XML dumps, keeping agent workflows fast and context consumption low, while keeping performance high.

agent-droid-bridge MCP server

Demo

Agent Droid Bridge Demo

The demo above runs through a few straightforward tasks to show what a connected agent can do, and this is just scratching the surface:

  • Installs the Paint app, opens it, and draws a house by calculating pixel coordinates for the walls and roof
  • Opens the device browser, searches for "MCP Wikipedia", navigates to the result page, and takes a screenshot
  • Opens the Calculator, computes 1337 × 42, and extracts the result to the host machine
  • Opens Contacts, creates a new entry with a name and phone number, and confirms it saved
  • Opens the Calendar and schedules an appointment for a specific date
  • Opens Settings and toggles dark mode
  • Extracts the Calculator APK from the device to the host machine
  • Installs Notepad, writes a one-sentence summary of every task completed, and takes a final screenshot

What it does

  • Exposes 14 MCP tools covering screen capture, UI inspection, screen reading, element extraction, touch and swipe input, text entry, keycode events, app launching, arbitrary ADB commands, and device capability inspection
  • Auto-detects the connected device when only one is present; presents a device list and requires the user to choose when multiple are connected
  • All commands parsed via shlex — no shell injection possible
  • Runs over stdio, compatible with any MCP-capable AI client
  • Purpose-built screen reading and element extraction tools return structured, minimal responses — a fraction of the size of a raw XML hierarchy — keeping agent context lean across long automation runs
  • Two execution modes: unrestricted (default, with optional shell denylist) and restricted (allowlist-only — only explicitly permitted shell commands are allowed); set ADB_EXECUTION_MODE=restricted to enable
  • Set ADB_ALLOW_SHELL=false to block all adb shell commands entirely, regardless of mode
  • Add tool names to tools.denied in adb_config.yaml to hide specific MCP tools from the agent at server startup — all filtering enforced at the server level

Install

uvx agent-droid-bridge

No cloning or virtual environments needed. Requires Python 3.11+ and ADB installed on your host.

uvx is provided by uv. If you don't have it: curl -LsSf https://astral.sh/uv/install.sh | sh

To install from source instead, see docs/setup.md — Option B.

To verify the install: uvx agent-droid-bridge --help

Quick start

  1. Install ADB — see docs/setup.md for platform-specific instructions
  2. Connect an Android device or start an emulator
  3. Add the server to your MCP client config:
{
  "mcpServers": {
    "agent-droid-bridge": {
      "command": "uvx",
      "args": ["agent-droid-bridge"],
      "env": {
        "ADB_EXECUTION_MODE": "unrestricted",
        "ADB_ALLOW_SHELL": "true"
      }
    }
  }
}
  1. Prompt your agent to use the agent-droid-bridge MCP tools

Full setup guide: docs/setup.md

Tools

Tool What it does
get_ui_hierarchy Returns the current screen as an XML UI hierarchy
take_screenshot Captures the screen as a base64-encoded PNG
tap_screen Sends a tap gesture at pixel coordinates
swipe_screen Sends a swipe gesture between two points over a given duration
type_text Types text into the focused input field
press_key Sends an Android keycode event (Back, Home, Enter, etc.)
launch_app Launches an app by its package/activity component name
execute_adb_command Runs an arbitrary ADB or ADB shell command
list_devices Lists all Android devices currently visible to ADB with their serial, state, and model
snapshot_ui Takes a lightweight UI snapshot and returns a token for use with detect_ui_change
detect_ui_change Polls for a UI change after an action; accepts a snapshot token as baseline; returns hierarchy only when requested
get_screen_elements Parses the UI hierarchy and returns structured elements with coordinates and interaction properties; supports tappable, interactive, input, and all modes
get_screen_text Returns all visible text on screen sorted top-to-bottom, as plain text
check_device_capabilities Returns structured device information — identity, security posture, and hardware specs — in a single call; supports identity, security, hardware, and all modes

Full parameter reference: docs/tools.md

Configuration

The server is configurable via adb_config.yaml and environment variables. Tuneable parameters include the ADB binary path, command timeouts, log level, execution mode, shell filtering rules, and tool visibility. Full reference: docs/configuration.md.

Session recording is configured separately via logging_config.yaml. Enable it by setting MCP_LOG_ENABLED=true and MCP_LOG_DIR in your MCP client config. Full reference: docs/logging.md.

Documentation

File Description
docs/setup.md Prerequisites, installation, and MCP client configuration
docs/tools.md Full parameter reference for all 14 tools
docs/configuration.md Reference for adb_config.yaml and environment variables
docs/logging.md Session recorder — log files, levels, retention, and activation

Contributing

Contributions are welcome. See CONTRIBUTING.md for guidelines on setup, code standards, and submitting pull requests.

To report a security vulnerability, follow the process in SECURITY.md — do not open a public issue.

Star History

Star History Chart

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

agent_droid_bridge-0.4.1.tar.gz (22.7 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

agent_droid_bridge-0.4.1-py3-none-any.whl (29.4 kB view details)

Uploaded Python 3

File details

Details for the file agent_droid_bridge-0.4.1.tar.gz.

File metadata

  • Download URL: agent_droid_bridge-0.4.1.tar.gz
  • Upload date:
  • Size: 22.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for agent_droid_bridge-0.4.1.tar.gz
Algorithm Hash digest
SHA256 e213af5aff7b8887a61aa6b8270ec6da58ce03ba8edfb9cff9c7309931b3edea
MD5 acbe6be7ed52b2cb8159830bc6314da6
BLAKE2b-256 401fb293b0719db6066e5c95e60debba4647a8d8029a72a6de202c5291e738f9

See more details on using hashes here.

File details

Details for the file agent_droid_bridge-0.4.1-py3-none-any.whl.

File metadata

File hashes

Hashes for agent_droid_bridge-0.4.1-py3-none-any.whl
Algorithm Hash digest
SHA256 0c53ff2b7a1d13d52cdf0883bc037679e17adb2bba8542c135aa11298822a2e6
MD5 475d0cae38c14a71ae5342149ae96d1e
BLAKE2b-256 647702271cbac66c968267a7c3dd8d5beeca8cfbc200a3e48cf79f88374e41af

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page