frida-mcp

Provides an MCP (Model Context Protocol) stdio server that exposes Frida dynamic instrumentation capabilities (process/device management, script injection, and an interactive JS REPL) to MCP-compatible AI clients such as Claude Desktop.

Evaluated Mar 30, 2026 (21d ago)
Repo ↗ Ai Ml mcp frida dynamic-instrumentation python stdio-server ai-agent-tools reverse-engineering
⚙ Agent Friendliness
59
/ 100
Can an agent use this?
🔒 Security
25
/ 100
Is it safe for agents?
⚡ Reliability
34
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
80
Documentation
70
Error Messages
0
Auth Simplicity
90
Rate Limits
10

🔒 Security

TLS Enforcement
0
Auth Strength
10
Scope Granularity
10
Dep. Hygiene
55
Secret Handling
60

No auth model, authorization, or secret-handling guidance is documented in the provided materials. The tool’s capabilities (interactive JS execution, hooking/interception, process control) substantially increase risk if exposed to untrusted agents/users. Transport appears to be stdio (not TLS-relevant), so security depends on local OS permissions and client access control. Dependency hygiene is partially unknown; declared dependencies are common libraries but no CVE/security posture is provided.

⚡ Reliability

Uptime/SLA
0
Version Stability
55
Breaking Changes
40
Error Recovery
40
AF Security Reliability

Best When

Used locally by trusted operators/agents who need AI-driven control of Frida instrumentation through an MCP-compatible client.

Avoid When

Avoid in multi-tenant systems or where arbitrary code execution/hooking is not explicitly controlled, since the tool enables powerful runtime instrumentation.

Use Cases

  • Automated dynamic analysis of mobile/desktop apps via Frida
  • AI-assisted process/device discovery and instrumentation workflows
  • Interactive JavaScript hooking and interception via an MCP client
  • Injecting and monitoring custom Frida scripts from an agent workflow
  • Guided workflows for reverse engineering and runtime inspection

Not For

  • Production-grade, least-privilege security-sensitive deployments without additional hardening
  • Environments where users cannot authorize or safely run Frida instrumentation
  • Use cases requiring a hosted, network-accessible API with built-in auth/rate limiting

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: None explicitly documented for MCP transport; local stdio server implied
OAuth: No Scopes: No

No authentication/authorization model is described in the provided README/manifest content; MCP access appears to rely on who can run/connect to the local stdio server.

Pricing

Free tier: No
Requires CC: No

Open-source MIT package; no pricing model described.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • This enables powerful instrumentation (process attach/spawn/kill, JS REPL, script injection); agents must treat inputs as high-risk.
  • Because it is likely a local stdio MCP server, connection lifecycle and process permissions matter (agent must start/stop/handle the server process correctly).
  • Long-running operations (e.g., script injection/monitoring) may require proper orchestration and timeouts; retry behavior and idempotency are not documented.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for frida-mcp.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-03-30.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered