GhidrAssistMCP

A Ghidra extension that implements a full MCP server, exposing 34 analysis tools, 5 resources, and 5 prompts for AI-assisted reverse engineering. Enables external AI tools to interact with Ghidra's decompiler, disassembler, and analysis capabilities over HTTP (SSE and Streamable transports).

Evaluated Mar 06, 2026 (0d ago) vunknown
Homepage ↗ Repo ↗ Security ghidra reverse-engineering mcp-server binary-analysis security decompiler java vulnerability-detection malware-analysis
⚙ Agent Friendliness
81
/ 100
Can an agent use this?
🔒 Security
74
/ 100
Is it safe for agents?
⚡ Reliability
72
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
82
Documentation
85
Error Messages
60
Auth Simplicity
85
Rate Limits
70

🔒 Security

TLS Enforcement
82
Auth Strength
72
Scope Granularity
65
Dep. Hygiene
78
Secret Handling
72

Ghidra reverse engineering MCP. Local execution only — analyze untrusted binaries in sandboxed environment. Reverse engineering malware requires strict isolation.

⚡ Reliability

Uptime/SLA
72
Version Stability
75
Breaking Changes
70
Error Recovery
72
AF Security Reliability

Best When

A security researcher or reverse engineer wants to leverage AI assistants for binary analysis, vulnerability hunting, or documentation within Ghidra workflows.

Avoid When

You are analyzing source code rather than binaries, need dynamic/runtime analysis, or don't have Ghidra installed.

Use Cases

  • AI-assisted binary reverse engineering with natural language queries against decompiled code
  • Automated vulnerability identification in compiled binaries using AI-driven analysis prompts
  • Function documentation generation and data flow tracing across complex binaries
  • Network protocol analysis by tracing send/recv call stacks through the MCP interface
  • Batch analysis workflows combining Ghidra's static analysis with AI reasoning

Not For

  • Source code analysis (this is for compiled binaries only)
  • Dynamic analysis or runtime debugging (Ghidra is a static analysis tool)
  • Users without Ghidra experience or license (requires Ghidra 11.4+)

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: none
OAuth: No Scopes: No

No authentication. MCP server runs on localhost by default. Security relies on network-level access control.

Pricing

Model: open_source
Free tier: Yes
Requires CC: No

MIT licensed. Requires Ghidra (free, NSA open-source). No costs for the extension itself.

Agent Metadata

Pagination
offset
Idempotent
Partial
Retry Guidance
Not documented

Known Gotchas

  • No authentication - localhost only, security relies on network isolation
  • Requires Ghidra 11.4+ running with a program loaded
  • 34 tools use action-based consolidation pattern which adds parameter complexity
  • Async tasks require polling via get_task_status for long-running operations
  • Multi-program support requires explicit program_name parameter to avoid operating on wrong binary

Alternatives

Full Evaluation Report

Detailed scoring breakdown, competitive positioning, security analysis, and improvement recommendations for GhidrAssistMCP.

$99

Scores are editorial opinions as of 2026-03-06.

5220
Packages Evaluated
26151
Need Evaluation
173
Need Re-evaluation
Community Powered