How to perform a security audit on an Android APK with JADX MCP
使うタイミング: You need to review an APK for security vulnerabilities.
前提条件
- JADX with jadx-ai-mcp plugin running with target APK loaded — Install plugin and open the APK in JADX-GUI
- jadx-mcp-server running — uv run jadx_mcp_server.py
フロー
-
Check manifest for issuesGet the AndroidManifest.xml. Check for exported components, dangerous permissions, and debug flags.✓ コピーしました→ Security findings from manifest analysis
-
Search for insecure patternsSearch for classes that use SharedPreferences, Log.d, or hardcoded URLs. Are there any credentials stored in plain text?✓ コピーしました→ List of potential security issues with code locations
結果: A security assessment report with specific code-level findings.
注意点
- ProGuard-obfuscated code is hard to follow — Use rename_variable and rename_class to deobfuscate as you analyze