Skip to main content
Glama

Python 3.11+ License MIT MCP Compatible PyPI MCP Registry Awesome PyPI Downloads

Agent Droid Bridge

Agent Droid Bridge is an MCP server that connects AI agents to Android devices and emulators over ADB. It is built for mobile automation, app testing, dynamic analysis, and reverse engineering: exposing the full surface of ADB as structured tools that any MCP-compatible AI client can call directly. If ADB can do it, an agent can do it.


Note: Purpose-built tools return structured, minimal responses instead of raw XML dumps, keeping agent workflows fast and context consumption low, while keeping performance high.


agent-droid-bridge MCP server

Demo

Agent Droid Bridge Demo

The demo above runs through a few straightforward tasks to show what a connected agent can do, and this is just scratching the surface:

  • Installs the Paint app, opens it, and draws a house by calculating pixel coordinates for the walls and roof

  • Opens the device browser, searches for "MCP Wikipedia", navigates to the result page, and takes a screenshot

  • Opens the Calculator, computes 1337 × 42, and extracts the result to the host machine

  • Opens Contacts, creates a new entry with a name and phone number, and confirms it saved

  • Opens the Calendar and schedules an appointment for a specific date

  • Opens Settings and toggles dark mode

  • Extracts the Calculator APK from the device to the host machine

  • Installs Notepad, writes a one-sentence summary of every task completed, and takes a final screenshot

What it does

  • Exposes 14 core MCP tools covering screen capture, UI inspection, screen reading, element extraction, touch and swipe input, text entry, keycode events, app launching, arbitrary ADB commands, and device capability inspection

  • Extra tool packs extend the core toolset via opt-in config — app_manager is the first pack, adding 9 tools for package management, app control, APK extraction, permission management, and intent injection

  • Auto-detects the connected device when only one is present; presents a device list and requires the user to choose when multiple are connected

  • All commands parsed via shlex — no shell injection possible

  • Runs over stdio, compatible with any MCP-capable AI client

  • Purpose-built screen reading and element extraction tools return structured, minimal responses — a fraction of the size of a raw XML hierarchy — keeping agent context lean across long automation runs

  • Two execution modes: unrestricted (default, with optional shell denylist) and restricted (allowlist-only — only explicitly permitted shell commands are allowed); set ADB_EXECUTION_MODE=restricted to enable

  • Set ADB_ALLOW_SHELL=false to block all adb shell commands entirely, regardless of mode

  • Add tool names to tools.denied in adb_config.yaml to hide specific MCP tools from the agent at server startup — all filtering enforced at the server level

  • Server instructions are automatically generated at startup and reflect the active tool set — agents receive a structured tool catalog at connect time, including any loaded extra tool packs

Install

uvx agent-droid-bridge

No cloning or virtual environments needed. Requires Python 3.11+ and ADB installed on your host.

uvx is provided by uv. If you don't have it: curl -LsSf https://astral.sh/uv/install.sh | sh

To install from source instead, see docs/setup.md — Option B.

To verify the install: uvx agent-droid-bridge --help

Quick start

  1. Install ADB — see docs/setup.md for platform-specific instructions

  2. Connect an Android device or start an emulator

  3. Add the server to your MCP client config:

{
  "mcpServers": {
    "agent-droid-bridge": {
      "command": "uvx",
      "args": ["agent-droid-bridge"],
      "env": {
        "ADB_EXECUTION_MODE": "unrestricted",
        "ADB_ALLOW_SHELL": "true",
        "MCP_LOG_ENABLED": "false",
        "MCP_LOG_DIR": "~/logs/agent-droid-bridge"
      }
    }
  }
}

To enable session logging, set MCP_LOG_ENABLED to "true" and update MCP_LOG_DIR to a writable path on your machine.

  1. Prompt your agent to use the agent-droid-bridge MCP tools

Full setup guide: docs/setup.md

Tools

Tool

What it does

get_ui_hierarchy

Returns the current screen as an XML UI hierarchy

take_screenshot

Captures the screen as a base64-encoded PNG

tap_screen

Sends a tap gesture at pixel coordinates

swipe_screen

Sends a swipe gesture between two points over a given duration

type_text

Types text into the focused input field

press_key

Sends an Android keycode event (Back, Home, Enter, etc.)

launch_app

Launches an app by its package/activity component name

execute_adb_command

Runs an arbitrary ADB or ADB shell command

list_devices

Lists all Android devices currently visible to ADB with their serial, state, and model

snapshot_ui

Takes a lightweight UI snapshot and returns a token for use with detect_ui_change

detect_ui_change

Polls for a UI change after an action; accepts a snapshot token as baseline; returns hierarchy only when requested

get_screen_elements

Parses the UI hierarchy and returns structured elements with coordinates and interaction properties; supports tappable, interactive, input, and all modes

get_screen_text

Returns all visible text on screen sorted top-to-bottom, as plain text

check_device_capabilities

Returns structured device information — identity, security posture, and hardware specs — in a single call; supports identity, security, hardware, and all modes

Extra tool packs

Optional packs extend the core toolset and must be enabled in adb_config.yaml. See docs/extra-tool-packs.md.

app_manager

Package management, app lifecycle control, APK extraction, permission management, and intent injection.

Tool

What it does

list_packages

Lists installed packages with optional filtering, search, and detail levels

get_app_info

Returns full static metadata for a single installed app

install_app

Installs an APK from a host path onto the device

uninstall_app

Removes an installed app by package name

pull_apk

Extracts the installed APK from the device to the host

manage_permission

Grants, revokes, checks, or lists runtime permissions for an app

launch_app_extra

Launches an app by package name, auto-resolving the launcher activity

manage_app

Controls app runtime state — stop, clear data, clear cache, enable, disable

inject_intent

Fires an intent at a component via am start, am broadcast, or am startservice

Full parameter reference: docs/tools.md

Configuration

The server is configurable via adb_config.yaml and environment variables. Tuneable parameters include the ADB binary path, command timeouts, log level, execution mode, shell filtering rules, and tool visibility. Full reference: docs/configuration.md.

Session recording is configured separately via logging_config.yaml. Enable it by setting MCP_LOG_ENABLED=true and MCP_LOG_DIR in your MCP client config. Full reference: docs/logging.md.

Documentation

File

Description

docs/setup.md

Prerequisites, installation, and MCP client configuration

docs/tools.md

Full parameter reference for all tools

docs/configuration.md

Reference for adb_config.yaml and environment variables

docs/logging.md

Session recorder — log files, levels, retention, and activation

docs/extra-tool-packs.md

Extra tool packs — enabling packs, the pack contract, and writing your own

Contributing

Contributions are welcome. See CONTRIBUTING.md for guidelines on setup, code standards, and submitting pull requests.

To report a security vulnerability, follow the process in SECURITY.md — do not open a public issue.

Install Server
A
security – no known vulnerabilities
A
license - permissive license
A
quality - A tier

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/Neverlow512/agent-droid-bridge'

If you have feedback or need assistance with the MCP directory API, please join our Discord server