Skip to main content

MCP server exposing Android security research tools for authorised penetration testing

Project description

mobile-security-mcp

Legitimate penetration testing toolkit — for use only on applications you are authorised to test.

An MCP (Model Context Protocol) server that exposes Android security research tools as callable functions to any MCP-compatible agent (Claude Code, Cline, Goose, OpenCode).


Requirements

Tool Type Purpose
Python 3.11+ runtime
apktool binary smali decompile
jadx binary Java decompile
apkid pip packer detection
apkleaks pip secret scanning
frida / frida-tools pip + binary dynamic instrumentation
objection pip high-level Frida wrapper
androguard pip manifest parsing
quark-engine pip vulnerability analysis
mitmproxy pip + binary traffic interception
ripgrep (rg) binary string search
uber-apk-signer.jar jar APK signing
JDK 11+ runtime needed for jar tools
adb binary device control

Installation

# Clone / download this repo
cd mobile-security-mcp

# Install (editable mode for development)
pip install -e .

# Check which tools are available
python -m mobile_security_mcp.setup.check_tools

Configuration

Edit mobile_security_mcp/config.toml:

[signing]
jar_path = "C:/path/to/uber-apk-signer.jar"

[tools]
# Override binary paths if not on PATH
apktool = "apktool"
adb = "adb"

Agent Integration

Claude Code (.claude/mcp.json)

{
  "mcpServers": {
    "mobile-security": {
      "command": "python",
      "args": ["-m", "mobile_security_mcp"]
    }
  }
}

Cline (VSCode settings)

"cline.mcpServers": {
  "mobile-security": {
    "command": "python",
    "args": ["-m", "mobile_security_mcp"]
  }
}

OpenCode (config.toml)

[[mcp]]
name    = "mobile-security"
command = "python"
args    = ["-m", "mobile_security_mcp"]

Goose (profiles.yaml)

profiles:
  android-security:
    extensions:
      - type: stdio
        cmd: python -m mobile_security_mcp

Available Tools (33 total)

Static analysis: apk_decompile, apk_decompile_java, apk_identify, apk_scan_secrets, apk_analyze_full, manifest_parse, search_strings

Dynamic: frida_spawn, frida_attach, frida_inject, frida_read_output, frida_detach, objection_run

RASP: rasp_identify, rasp_bypass

Device: adb_devices, adb_shell, adb_install, adb_pull, adb_push, adb_logcat_start, adb_logcat_read, adb_logcat_stop

Network: mitm_start, mitm_stop, ssl_kill_switch

Signing: apk_sign, apk_rebuild_sign

Memory: memory_read, memory_write

Setup: check_tools, install_tool


Knowledge Resources

Ask your agent to load these for context:

  • knowledge://detection-patterns — root / Frida / emulator / integrity detections
  • knowledge://bypass-playbooks — escalation ladders
  • knowledge://framework-fingerprints — Flutter / RN / Unity / Xamarin
  • knowledge://crypto-patterns — hardcoded keys, weak cipher patterns
  • knowledge://common-mistakes — what juniors get wrong

Prompts

Name Description
first-look Ordered checklist for any new APK
rasp-assess Full RASP assessment protocol
bypass-ssl SSL pinning bypass escalation
bypass-root Root detection bypass escalation
bypass-frida Frida detection bypass escalation
stuck Protocol when a bypass fails

Session Memory

The server maintains a per-target memory file at:

mobile_security_mcp/targets/<package>/memory.md

Use memory_read at session start and memory_write after every significant finding.


Legal

This tool is for authorised penetration testing only. You are responsible for ensuring you have explicit written permission before testing any application.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mobile_security_mcp-0.1.2.tar.gz (63.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

mobile_security_mcp-0.1.2-py3-none-any.whl (76.0 kB view details)

Uploaded Python 3

File details

Details for the file mobile_security_mcp-0.1.2.tar.gz.

File metadata

  • Download URL: mobile_security_mcp-0.1.2.tar.gz
  • Upload date:
  • Size: 63.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.0

File hashes

Hashes for mobile_security_mcp-0.1.2.tar.gz
Algorithm Hash digest
SHA256 ec43761696949d8eaa0375273ab0e32511d59c714297773d613c81358bb03b2b
MD5 7a0fcd15faf61c739f4cbfdd1e7829ec
BLAKE2b-256 64c70ef92281467f67cda86a8aac2b78b3f3f32b9c22201ad5a24d30918ce378

See more details on using hashes here.

File details

Details for the file mobile_security_mcp-0.1.2-py3-none-any.whl.

File metadata

File hashes

Hashes for mobile_security_mcp-0.1.2-py3-none-any.whl
Algorithm Hash digest
SHA256 53893911b3ebeba4cee3fd0e3bb379b7ddf152b572f909b978edc204afa0df79
MD5 dd5b0134b30a6fabf4a84bda4668bc22
BLAKE2b-256 366d0f6a847c12a7def2ae9b5b2f87c2a3d746ed4b54cd501e626dd1ec5bf9f0

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page