Server data from the Official MCP Registry
Token-efficient Ghidra RE: decompile, xrefs, Swift/ObjC, ELF/Mach-O, async analysis
Token-efficient Ghidra RE: decompile, xrefs, Swift/ObjC, ELF/Mach-O, async analysis
Set these up before or after installing:
Environment variable: GHIDRA_INSTALL_DIR
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-johnzfitch-pyghidra-lite": {
"env": {
"GHIDRA_INSTALL_DIR": "your-ghidra-install-dir-here"
},
"args": [
"pyghidra-lite"
],
"command": "uvx"
}
}
}This is a well-structured MCP server for Ghidra reverse engineering with proper authentication and good code quality. The moderate risk stems from some potentially unsafe subprocess operations and a global flag that bypasses path restrictions, though permissions are appropriate for the tool's purpose. Supply chain analysis found 4 known vulnerabilities in dependencies (0 critical, 3 high severity). Package verification found 1 issue.
Scanned 3 files · 10 findings
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Be the first to review this server!