Leak Canary MCP Server ๐ AI-powered Android leak detection & fixing tool. Collects LeakCanary reports via MCP and uses Cursor, Copilot, Claude, etc. to analyze and suggest fixes automatically. Helps developers quickly identify, understand, and resolve memory leaks for faster, cleaner apps.
{
"mcpServers": {
"leak-canary-mcp-server": {
"command": "<see-readme>",
"args": []
}
}
}No install config available. Check the server's README for setup instructions.
Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Leak Canary MCP Server ๐ AI-powered Android leak detection & fixing tool. Collects LeakCanary reports via MCP and uses Cursor, Copilot, Claude, etc. to analyze and suggest fixes automatically. Helps developers quickly identify, understand, and resolve memory leaks for faster, cleaner apps.
Is it safe?
No package registry to scan.
No authentication โ any process on your machine can connect.
License not specified.
Is it maintained?
Last commit 0 days ago. 1 stars.
Will it work with my client?
Transport: stdio. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
No automated test available for this server. Check the GitHub README for setup instructions.
No known vulnerabilities.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationHave you used this server?
Share your experience โ it helps other developers decide.
Sign in to write a review.
A Model Context Protocol (MCP) server and CLI that provides tools for agent use when working on iOS and macOS projects.
Dynamic problem-solving through sequential thought chains
A Model Context Protocol server for searching and analyzing arXiv papers
The Apify MCP server enables your AI agents to extract data from social media, search engines, maps, e-commerce sites, or any other website using thousands of ready-made scrapers, crawlers, and automation tools available on the Apify Store.
MCP Security Weekly
Get CVE alerts and security updates for Leak Canary Mcp Server and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
A standalone Kotlin/JVM MCP server that automates Android memory leak detection using LeakCanary and adb logcat. It parses leak traces, classifies root causes, assigns priority levels, suggests fixes, and tracks leak history across sessions -- all exposed as MCP tools for use in Cursor, VS Code, and Android Studio.
adb from ANDROID_HOME, ANDROID_SDK_ROOT, or common SDK install locationsRepository Link: https://github.com/ravisharma46/Leak-Canary-Mcp-Server.git
The fastest and most universally compatible way to use the MCP server across Windows, macOS, and Linux. It requires zero path configuration.
Add this directly to your ~/.cursor/mcp.json:
{
"mcpServers": {
"leakcanary": {
"command": "npx",
"args": ["-y", "leakcanary-mcp"]
}
}
}
Restart Cursor and the 12 tools will appear in the MCP tools panel.
Make sure you have GitHub Copilot extension installed with Agent mode enabled (VS Code 1.99+).
Option A โ Workspace level (.vscode/mcp.json in your project root):
{
"servers": {
"leakcanary": {
"type": "stdio",
"command": "npx",
"args": ["-y", "leakcanary-mcp"]
}
}
}
Option B โ User level (VS Code settings.json):
{
"mcp": {
"servers": {
"leakcanary": {
"type": "stdio",
"command": "npx",
"args": ["-y", "leakcanary-mcp"]
}
}
}
}
Open Copilot Chat โ Agent mode and the LeakCanary tools will be available.
Android Studio supports MCP servers through the Gemini plugin (Android Studio Meerkat 2024.3+ or later).
{
"mcpServers": {
"leakcanary": {
"command": "npx",
"args": ["-y", "leakcanary-mcp"]
}
}
}
Alternatively, add a mcp.json file in the .idea folder of your project:
{
"mcpServers": {
"leakcanary": {
"command": "npx",
"args": ["-y", "leakcanary-mcp"]
}
}
}
Restart Android Studio and the tools will appear under Gemini โ MCP Tools.
Note: All setups use
npxto dynamically execute the wrapper. The wrapper auto-downloads and updates the server JAR for you on each run.
The server reads leak data directly from the app's LeakCanary SQLite database as the primary source, not from adb logcat. This means leak data is always available -- even after reboots, logcat buffer clears, or the next day.
leaks.db to the host and deserializes the HeapAnalysisSuccess Java objects stored as BLOBs using the shark library. This provides the full analysis -- complete reference chains, retained sizes, leak status per node, GC roots, heap metadata, and device info. Identical quality to what you see in the LeakCanary app.adb logcat -s LeakCanary.package_name is provided, the server automatically scans all installed apps on the device to find ones with a LeakCanary database. If multiple apps are found, it prompts you to choose. If only one app is found, it reads leaks directly.T