A sandboxed MCP tool for reverse engineering with multiple tool integrations
{
"mcpServers": {
"io-github-daedalus-mcp-reverse-engineering": {
"command": "<see-readme>",
"args": []
}
}
}No install config available. Check the server's README for setup instructions.
Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
A sandboxed MCP tool for reverse engineering with multiple tool integrations
Is it safe?
No package registry to scan.
No authentication — any process on your machine can connect.
License not specified.
Is it maintained?
Last commit 15 days ago. 1 stars.
Will it work with my client?
Transport: stdio. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
No automated test available for this server. Check the GitHub README for setup instructions.
No known vulnerabilities.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationHave you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Persistent memory using a knowledge graph
Privacy-first. MCP is the protocol for tool access. We're the virtualization layer for context.
Pre-build reality check. Scans GitHub, HN, npm, PyPI, Product Hunt — returns 0-100 signal.
Monitor browser logs directly from Cursor and other MCP compatible IDEs.
MCP Security Weekly
Get CVE alerts and security updates for io.github.daedalus/mcp_reverse_engineering and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
mcp-name: io.github.daedalus/mcp_reverse_engineering
A sandboxed MCP (Managed Computation Platform) tool for reverse engineering that provides a unified interface to various reverse engineering tools with security restrictions.
file, strings, hexdump, xxdobjdump, readelf, ldd, strace, ltrace, upx, gdb, radare2, angr, ghidra, fridabinwalk, unsquashfs, sasquatch, jefferson, ubi_reader, unpackers, retdc, qemucurl, wgetpip install -e .
Build and run with Docker:
# Build the image
docker build -t mcp-reverse-engineering .
# Run with docker-compose
docker-compose up -d
# Or run directly with volume mount
docker run -v $(pwd)/workspace:/workspace mcp-reverse-engineering --tool strings --args "-n 10" --file ./binary.exe
The container runs with security hardening:
For remote MCP access, the container can be configured to serve over HTTP/SSE:
# With custom port mapping
docker-compose up -d
Tools are configured via YAML files to control which tools are loaded. This prevents overwhelming LLM context windows by enabling only the tools you need.
Default config (tools_config.yaml): All tools disabled
Example configs:
examples/minimal.yaml - Only file analysis tools (3 tools)examples/firmware.yaml - File + Binary + Firmware analysisexamples/full.yaml - All 25 tools enabled# Enable specific tool categories
settings:
default_timeout: 300
categories:
file_analysis:
enabled: true
tools:
- file
- strings
- hexdump
# Using the CLI with default config
mcp-re --tool strings --args "-n 10" --file ./binary.exe
# Using a specific config
mcp-re --config examples/minimal.yaml --tool strings --args [] --file ./binary.exe
Programmatic usage:
from mcp_reverse_engineering.core.engine import ReverseEngineeringEngine
# Load with default config (no tools enabled)
engine = ReverseEngineeringEngine()
# Load with specific config
engine = ReverseEngineeringEngine(config_path="examples/minimal.yaml")
# List enabled tools
print(engine.list_available_tools())
# Get MCP-compatible tool schemas
print(engine.get_mcp_tools())
# Execute a tool
result = engine.execute_tool("strings", ["-n", "10"], "./binary.exe")
print(result)
Run mcp-re --tool help to see all available tools, or check the knowledge base in the source code.
The tool employs multiple layers of security:
Run the test suite