JEB MCP Server

JEB MCP server enabling AI agents to interact with JEB — PNF Software's commercial Android and native binary decompiler — querying decompiled Dalvik/DEX bytecode, retrieving Java pseudocode, accessing cross-references and symbol information, and integrating JEB's Android analysis capabilities into agent-driven mobile app reverse engineering workflows.

Evaluated Mar 06, 2026 (0d ago) vcurrent
Homepage ↗ Repo ↗ Developer Tools jeb android reverse-engineering decompiler mcp-server binary-analysis dalvik dex
⚙ Agent Friendliness
73
/ 100
Can an agent use this?
🔒 Security
75
/ 100
Is it safe for agents?
⚡ Reliability
65
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
68
Documentation
68
Error Messages
65
Auth Simplicity
90
Rate Limits
85

🔒 Security

TLS Enforcement
80
Auth Strength
72
Scope Granularity
68
Dep. Hygiene
68
Secret Handling
88

Local JEB process. No credentials for MCP. JEB license required. Analyze APKs in isolated environment.

⚡ Reliability

Uptime/SLA
68
Version Stability
65
Breaking Changes
65
Error Recovery
62
AF Security Reliability

Best When

A mobile security researcher with JEB needs AI-assisted Android app analysis — decompiled DEX/Java code combined with LLM reasoning for malware analysis or app auditing.

Avoid When

You don't have a JEB license, need iOS binary analysis, or prefer free Ghidra/jadx for Android RE.

Use Cases

  • Decompiling Android APK bytecode from mobile security research agents
  • Querying DEX/Dalvik disassembly and cross-references from RE agents
  • Analyzing Android malware with AI-assisted decompilation from threat research agents
  • Auditing Android applications for vulnerabilities from security audit agents
  • Retrieving Java pseudocode for binary understanding from analysis agents
  • Automating JEB scripting tasks via MCP from workflow agents

Not For

  • Teams without JEB license (commercial tool with significant cost)
  • iOS/macOS binary analysis (JEB focuses on Android/DEX; use Ghidra or IDA for iOS)
  • Source code analysis (JEB is for compiled Android/binary code)

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
Yes
Webhooks
No

Authentication

Methods: none
OAuth: No Scopes: No

No authentication for MCP — JEB script runs inside JEB process via JEB's Python scripting API. JEB license required separately. MCP connects to running JEB instance.

Pricing

Model: paid
Free tier: No
Requires CC: Yes

JEB is commercial software. MCP server (jebmcp) is free open source. JEB license required for full decompilation capabilities.

Agent Metadata

Pagination
none
Idempotent
Full
Retry Guidance
Not documented

Known Gotchas

  • JEB must be running with APK loaded and JEB Python scripting active
  • JEB scripting API changes between JEB versions — ensure compatibility
  • Decompilation quality depends on APK obfuscation and ProGuard usage
  • Community MCP from dawnslab — niche tool for JEB users
  • JEB Python API is different from IDA's IDAPython — scripts not portable
  • Analyze APK fully in JEB before querying for best decompilation results

Alternatives

Full Evaluation Report

Detailed scoring breakdown, competitive positioning, security analysis, and improvement recommendations for JEB MCP Server.

$99

Scores are editorial opinions as of 2026-03-06.

5215
Packages Evaluated
26151
Need Evaluation
173
Need Re-evaluation
Community Powered