{"id":"symgraph-ghidrassistmcp","name":"GhidrAssistMCP","af_score":49.0,"security_score":22.8,"reliability_score":22.5,"what_it_does":"GhidrAssistMCP is a Ghidra extension that runs an MCP (Model Context Protocol) server, exposing a set of reverse-engineering tools, static program resources, and pre-built prompts so external AI assistants/tools can query and modify analysis state inside Ghidra (e.g., functions, strings, types, comments, renaming, structure operations).","best_when":"You want AI-assisted reverse engineering tightly coupled to an interactive Ghidra session and you can connect an MCP client to the locally hosted MCP server.","avoid_when":"You cannot restrict network access to the MCP server or you need strong tenant isolation/auditability of who is modifying analysis data.","last_evaluated":"2026-03-30T13:26:57.680558+00:00","has_mcp":true,"has_api":false,"auth_methods":[],"has_free_tier":false,"known_gotchas":["State-changing tools can alter Ghidra artifacts; agents should confirm targets/program context (the README emphasizes active context hints but does not guarantee safety).","Async task operations require polling via get_task_status and handling cancellation; retry behavior is not documented.","Network exposure: default host localhost/port 8080 is configurable; if bound beyond localhost, unauthenticated access could be possible.","Pagination parameters (e.g., limit) are mentioned for some list/search tools, but a uniform pagination contract is not fully specified across all endpoints in the README snippet."],"error_quality":0.0}