dnSpy-MCP

mcp
Guvenlik Denetimi
Basarisiz
Health Uyari
  • No license — Repository has no license file
  • Description — Repository has a description
  • Active repo — Last push 0 days ago
  • Low visibility — Only 9 GitHub stars
Code Basarisiz
  • Hardcoded secret — Potential hardcoded credential in deploy/k8s-deployment.yaml
  • Hardcoded secret — Potential hardcoded credential in src/cli/cli.py
Permissions Gecti
  • Permissions — No dangerous permissions requested
Purpose
This tool is a Model Context Protocol (MCP) server that provides static analysis, decompilation, and IL disassembly for .NET assemblies. It allows AI assistants to safely inspect .NET code without actually executing the target files.

Security Assessment
Overall Risk: High. The README explicitly notes that the tool operates via local stdio and never executes the target assemblies, which is a strong security design. However, the codebase contains multiple critical failures. The automated scan flagged potential hardcoded credentials in two distinct locations (`deploy/k8s-deployment.yaml` and `src/cli/cli.py`). While the core server itself requests no dangerous permissions, embedding secrets directly in the source code is a severe security vulnerability that could easily lead to accidental data leaks or compromised infrastructure.

Quality Assessment
The project is actively maintained, with its most recent code push occurring today. However, it suffers from extremely low community visibility and adoption, currently sitting at only 9 GitHub stars. Furthermore, the repository completely lacks a license file. This means that, legally, default copyright applies and the code cannot be safely modified, distributed, or used in commercial environments without explicit permission from the author. Consequently, the community trust level is very low.

Verdict
Not recommended due to hardcoded credentials in the codebase and the absence of a software license.
SUMMARY

Headless CLI reflection debugger for .NET assemblies with MCP server support

README.md

dnSpy-MCP

A Model Context Protocol server for static .NET assembly analysis powered by ICSharpCode.Decompiler (dnSpyEx engine). Exposes decompilation, IL disassembly, metadata inspection, and protection analysis as MCP tools over stdio. Never executes target assemblies.

Requirements

  • .NET 8 SDK or later
  • Compatible MCP client (Claude Desktop, Cursor, or any client supporting MCP stdio transport)

Installation

git clone https://github.com/ZeraTS/dnSpy-MCP.git
cd dnSpy-MCP
dotnet build src/DnSpyMcp/DnSpyMcp.csproj -c Release

Claude Desktop Configuration

Add to claude_desktop_config.json:

{
  "mcpServers": {
    "dnspy-mcp": {
      "command": "dotnet",
      "args": ["/path/to/src/DnSpyMcp/bin/Release/net8.0/DnSpyMcp.dll"]
    }
  }
}

Tools

Tool Description Key Parameters
get_pe_info Get PE/COFF header information, assembly metadata, and target framework assemblyPath
get_resources List all manifest resources embedded in the assembly assemblyPath
resolve_token Resolve a metadata token (hex, e.g. 0x02000001) to its definition assemblyPath, tokenHex
list_pinvokes List all P/Invoke (DllImport) declarations in the assembly assemblyPath
find_attributes Find all types and methods decorated with a specific attribute assemblyPath, attributeName
get_methods_for_type Get all methods defined on a specific type assemblyPath, typeName
decompile_assembly Decompile the entire assembly to C# source code assemblyPath
decompile_type Decompile a specific type to C# source code assemblyPath, typeName
decompile_method Decompile a specific method to C# source code assemblyPath, typeName, methodName
dump_il Dump IL (CIL) disassembly for the whole assembly, a type, or a specific method assemblyPath, typeName?, methodName?
inspect_type Inspect a type's structure: fields, methods, properties, interfaces, optionally with source assemblyPath, typeName, includeSource?
inspect_method Inspect a specific method: signature, parameters, decompiled source, optionally IL assemblyPath, typeName, methodName, includeSource?, includeIL?
list_types List all type definitions in the assembly assemblyPath
find_methods Find methods in the assembly, optionally filtered by name pattern assemblyPath, pattern?
search_strings Search for string literals in the assembly's decompiled source assemblyPath, pattern, useRegex?
search_members Search for types, methods, fields, and properties by name pattern assemblyPath, pattern
set_breakpoint Set a virtual breakpoint on a method at a specific IL offset assemblyPath, typeName, methodName, ilOffset
list_breakpoints List all active virtual breakpoints
inspect_breakpoint Show IL at a breakpoint offset, infer stack types, and find all callers of the method id
clear_breakpoints Remove all virtual breakpoints or a specific one by id id?
detect_anti_debug Static analysis to detect anti-debug techniques across 7 categories assemblyPath
detect_anti_tamper Static analysis to detect obfuscation and anti-tamper protections assemblyPath
get_protection_report Aggregate anti-debug and anti-tamper analysis into a report with risk score (0-10) and bypass recommendations assemblyPath

Protection Analysis

detect_anti_debug, detect_anti_tamper, and get_protection_report perform static analysis only. The target assembly is never loaded as a .NET type, never JIT-compiled, and never executed. Analysis uses ICSharpCode.Decompiler's type system and PE reader exclusively.

Anti-Debug Detection Categories

  • P/Invoke declarations targeting known anti-debug APIs (IsDebuggerPresent, NtQueryInformationProcess, etc.)
  • Managed API usage (System.Diagnostics.Debugger.IsAttached, etc.)
  • Timing-based checks (Stopwatch, GetTickCount, QueryPerformanceCounter patterns)
  • Thread hiding (NtSetInformationThread with ThreadHideFromDebugger)
  • TLS callback presence (executes before Main entry point)
  • Hardware breakpoint detection (CONTEXT Dr0-Dr3 reads)
  • Exception-based anti-debug patterns

Anti-Tamper Detection Categories

  • Obfuscator fingerprinting (ConfuserEx, Dotfuscator, Eazfuscator, .NET Reactor, SmartAssembly, KoiVM, and 10+ more)
  • Name obfuscation heuristics (control characters, zero-width characters, saturation)
  • String encryption stubs (cctor array init patterns, int-to-string decrypt method signatures)
  • Control flow obfuscation (switch proxies, high goto density)
  • Integrity checks (self-hash, File.ReadAllBytes on own assembly, termination after hash comparison)
  • VM/virtualisation (large switch dispatchers, encrypted IL stubs)
  • Packing (PE section names: UPX, MPRESS, .vmp0, Themida, etc.)

Risk Score

get_protection_report computes a risk score (0-10):

  • High severity/confidence finding: +1.5 points
  • Medium: +0.75 points
  • Low: +0.25 points
  • Capped at 10

Project Structure

src/DnSpyMcp/
├── Program.cs
├── Core/
│   ├── AssemblyCache.cs        Thread-safe decompiler cache (keyed by path + mtime)
│   └── BreakpointRegistry.cs  In-memory virtual breakpoint store
├── Models/
│   └── Results.cs              All result record types
└── Tools/
    ├── Analysis/
    │   ├── AnalysisTools.cs    PE info, resources, token resolution, P/Invokes, attributes
    │   ├── BreakpointTools.cs  Virtual breakpoints: set, list, inspect, clear
    │   ├── DecompileTools.cs   C# decompilation, IL disassembly
    │   ├── InspectTools.cs     Type and method inspection
    │   └── SearchTools.cs      Type/method/member/string search
    └── Security/
        ├── AntiDebugTools.cs         Anti-debug pattern detection
        ├── AntiTamperTools.cs        Obfuscation and anti-tamper detection
        └── ProtectionReportTools.cs  Aggregated protection report

Known Issues

Analysis of heavily obfuscated assemblies may produce false positives in name obfuscation heuristics

The name obfuscation detector flags members with single-letter names or compiler-generated names (containing < >). Standard .NET compiler-generated types (lambda closures, async state machines) will contribute to the obfuscated-name ratio. The threshold is set at 30% to reduce noise, but assemblies making heavy use of generics or LINQ may still trigger it.

String encryption detection requires obfuscated method names

The string decryption method detector only fires when the method name itself is obfuscated (contains control characters or is a single letter). If a protector uses readable method names for its string decrypt routines, this check will not detect them. The cctor array initialisation pattern is unaffected.

Assembly resolver errors on assemblies with missing dependencies

ICSharpCode.Decompiler attempts to resolve referenced assemblies from the same directory as the target. If dependencies are missing, decompilation of affected methods will fall back to partial output or skip. PE-level operations (get_pe_info, get_resources, resolve_token, list_pinvokes) are not affected. ThrowOnAssemblyResolveErrors is set to false by default to suppress resolver errors.

P/Invoke entry point detection is limited to DllImportAttribute

The list_pinvokes and anti-debug P/Invoke scanner only detect methods decorated with [DllImport]. Dynamic P/Invoke patterns using NativeLibrary.Load + GetExport, GetProcAddress via Marshal, or manually built delegate function pointers will not be detected.

Credits

Detect It Easy (DIE)

The protection detection logic in Tools/Security/ draws directly from the detection approach used by Detect It Easy by horsicq.

DIE's core insight — that protector fingerprinting should operate on raw binary byte patterns, PE section metadata, and metadata string heap searches rather than decompiled source — is the foundation of the sub-millisecond detection performance in this project. Several obfuscator signatures (ConfuserEx, Eazfuscator, KoiVM, .NET Reactor, VMProtect, Dotfuscator, MPRESS, Themida, and others) are adapted from DIE's PE signature scripts under db/PE/. DIE is maintained by horsicq and contributors and is available under the MIT license.

Anti-Debug Research

The anti-debug detection categories and API coverage are informed by:

  • bengabay1994, Anti-Debugging with .NET in Windows Environment — PEB field checks (BeingDebugged, NtGlobalFlag, heap Flags/ForceFlags), StartupInfo.lpDesktop, NtCreateThreadEx thread hiding
  • hsheric0210, AntiDebug.NET — comprehensive .NET anti-debug and anti-VM technique reference covering dynamic IAT resolution, manual module mapping, and hook bypass patterns
  • Check Point Research, Anti-Debug Tricks — referenced via AntiDebug.NET

Yorumlar (0)

Sonuc bulunamadi