How to analyze an Android APK with AI assistance using JADX
使うタイミング: You have an APK to analyze and want AI to help understand its behavior.
前提条件
- JADX with jadx-ai-mcp plugin — jadx plugins --install 'github:zinja-coder:jadx-ai-mcp'
- JADX MCP Server running — Set up the Python MCP server with uv
フロー
-
Check the manifestGet the AndroidManifest.xml. What permissions does this app request and what components (activities, services, receivers) does it declare?✓ コピーしました→ Parsed manifest with permission analysis
-
Find interesting classesSearch for classes related to network communication or encryption. List them with their methods.✓ コピーしました→ Filtered class list with method signatures
-
Analyze and renameGet the source code of the main network class. Rename obfuscated methods to descriptive names based on their behavior.✓ コピーしました→ Decompiled code with meaningful names applied
結果: An annotated view of the APK with key functionality understood and obfuscation partially reversed.
注意点
- Heavily obfuscated apps resist decompilation — Use get_smali_of_class for bytecode-level analysis when decompilation fails