How to perform a security audit on an Android APK with JADX MCP
When to use: You need to review an APK for security vulnerabilities.
Prerequisites
- JADX with jadx-ai-mcp plugin running with target APK loaded — Install plugin and open the APK in JADX-GUI
- jadx-mcp-server running — uv run jadx_mcp_server.py
Flow
-
Check manifest for issuesGet the AndroidManifest.xml. Check for exported components, dangerous permissions, and debug flags.✓ Copied→ Security findings from manifest analysis
-
Search for insecure patternsSearch for classes that use SharedPreferences, Log.d, or hardcoded URLs. Are there any credentials stored in plain text?✓ Copied→ List of potential security issues with code locations
Outcome: A security assessment report with specific code-level findings.
Pitfalls
- ProGuard-obfuscated code is hard to follow — Use rename_variable and rename_class to deobfuscate as you analyze