{"id":"s4dp4nd4-frida-c2-mcp","name":"frida-c2-mcp","af_score":30.2,"security_score":11.2,"reliability_score":22.5,"what_it_does":"frida-c2-mcp (FridaC2MCP) is an MCP server that exposes Frida dynamic instrumentation over a networked, streamable HTTP transport. It is intended to run entirely on rooted Android and jailbroken iOS devices, translating MCP/HTTP requests into Frida operations such as process/application management, attaching sessions, and executing/injecting bundled JavaScript Frida scripts.","best_when":"Used on isolated networks for proof-of-concept experimentation, where the operator controls the device and network and understands the risks of exposing instrumentation capabilities over HTTP.","avoid_when":"Avoid on public/shared networks or any environment where untrusted parties might reach the device endpoint; avoid if you need encryption/authentication, strong auditability, or stable session semantics.","last_evaluated":"2026-03-30T15:23:46.465404+00:00","has_mcp":true,"has_api":true,"auth_methods":[],"has_free_tier":false,"known_gotchas":["Designed as a proof-of-concept; README explicitly mentions lack of proper session management and graceful error handling.","Network-exposed instrumentation endpoint may require isolated network conditions and careful client-side throttling.","iOS build details suggest non-trivial on-device dependencies; environment mismatches may cause operational issues."],"error_quality":0.0}