radare2-hatchery

Radare2 Hatchery

16 stars

Best use case

radare2-hatchery is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

Radare2 Hatchery

Teams using radare2-hatchery should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/radare2-hatchery/SKILL.md --create-dirs "https://raw.githubusercontent.com/plurigrid/asi/main/plugins/asi/skills/radare2-hatchery/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/radare2-hatchery/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How radare2-hatchery Compares

Feature / Agentradare2-hatcheryStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Radare2 Hatchery

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

SKILL.md Source

# Radare2 Hatchery

---
name: radare2-hatchery
description: MCP server for radare2 binary analysis integration with AI assistants. Decompilation, disassembly, and reverse engineering via MCP protocol.
trit: -1
color: "#D6DB4C"
---

## Overview

**radare2-mcp** provides an MCP server enabling Claude and other AI assistants to perform binary analysis using radare2.

## Features

- **Direct stdin/stdout communication** - Simple MCP transport
- **Binary analysis tools** - Full radare2 capabilities
- **AI assistant integration** - Seamless Claude Desktop support
- **File exploration** - Inspect any binary format
- **Decompilation** - Pseudocode generation via r2ghidra

## Installation

```bash
# Via r2pm (radare2 package manager)
r2pm -Uci r2mcp
```

## Configuration

### Claude Desktop

Edit `~/Library/Application Support/Claude/claude_desktop_config.json`:

```json
{
  "mcpServers": {
    "radare2": {
      "command": "r2pm",
      "args": ["-r", "r2mcp"]
    }
  }
}
```

### Docker

```bash
docker build -t r2mcp .
```

```json
{
  "mcpServers": {
    "radare2": {
      "command": "docker",
      "args": ["run", "--rm", "-i", "-v", "/tmp/data:/data", "r2mcp"]
    }
  }
}
```

## MCP Tools Available

The server exposes radare2 analysis via MCP:

- `open_file` - Open binary for analysis
- `analyze` - Run analysis at depth levels 0-4
- `decompile_function` - Get C-like pseudocode
- `list_functions` - Enumerate discovered functions
- `list_strings` - Extract strings from binary
- `xrefs_to` - Find cross-references
- `run_command` - Execute raw r2 commands

## Gay.jl Integration

```julia
# Rec2020 wide gamut learning
gay_seed!(0xe72b09cb7aebe913)

# Forward mode autodiff
∂params = Enzyme.gradient(Forward, loss, params, seed)
```

## Repository

- **Source**: TeglonLabs/radare2-mcp
- **Seed**: `0xe72b09cb7aebe913`
- **Index**: 55/1055
- **Color**: #b3a6b8

## GF(3) Triad

```
radare2-hatchery (-1) ⊗ mcp-builder (0) ⊗ gay-mcp (+1) = 0 ✓
```

## Related Skills

- `mcp-builder` - MCP server development
- `blackhat-go` - Security techniques
- `tree-sitter` - AST-based code analysis