Skip to main content
Glama

Intercept Android App via Frida

frida_android_intercept

Intercept Android app traffic using Frida dynamic instrumentation to disable certificate pinning and analyze HTTP(S) communications through HTTP Toolkit.

Instructions

Intercept a specific Android app using Frida dynamic instrumentation. Automatically disables most certificate pinning. Requires a rooted device with Frida server running (use frida_android_setup and frida_android_launch first).

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
proxyPortYesProxy port to route traffic through
hostIdYesFrida host ID
targetIdYesTarget app identifier. Use get_interceptor_metadata with id "android-frida" and subId set to the hostId to list available app targets.
enableSocksNoEnable SOCKS proxy support (default: false)

Implementation Reference

  • Registration and handler implementation for the frida_android_intercept tool. It delegates to the client.activateInterceptor method.
    server.registerTool(
      'frida_android_intercept',
      {
        title: 'Intercept Android App via Frida',
        description: 'Intercept a specific Android app using Frida dynamic instrumentation. Automatically disables most certificate pinning. Requires a rooted device with Frida server running (use frida_android_setup and frida_android_launch first).',
        inputSchema: z.object({
          proxyPort: z.number().describe('Proxy port to route traffic through'),
          hostId: z.string().describe('Frida host ID'),
          targetId: z.string().describe('Target app identifier. Use get_interceptor_metadata with id "android-frida" and subId set to the hostId to list available app targets.'),
          enableSocks: z.boolean().optional().describe('Enable SOCKS proxy support (default: false)'),
        }),
      },
      async ({ proxyPort, hostId, targetId, enableSocks }) =>
        jsonResult(await client.activateInterceptor('android-frida', proxyPort, {
          action: 'intercept', hostId, targetId, enableSocks
        }))
    );
Behavior4/5

Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?

With no annotations provided, the description carries the full burden. It discloses key behavioral traits: it 'Automatically disables most certificate pinning' (a security bypass feature), requires a rooted device and Frida server (permissions/environment), and references setup tools (prerequisites). It doesn't mention rate limits, error handling, or what 'intercept' entails operationally, but covers critical context.

Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.

Conciseness5/5

Is the description appropriately sized, front-loaded, and free of redundancy?

The description is front-loaded with the core purpose, followed by key behavioral detail and prerequisites. All three sentences earn their place: first states what it does, second adds a critical feature (certificate pinning disable), third specifies requirements and setup steps. Zero wasted words.

Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.

Completeness4/5

Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?

For a complex tool with no annotations and no output schema, the description does well: it explains the purpose, key behavior, and prerequisites. It could be more complete by detailing what 'intercept' means (e.g., traffic capture, code injection) or output expectations, but given the sibling tools (like 'capture_traffic'), context is partially covered. The high schema coverage helps.

Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.

Parameters3/5

Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?

Schema description coverage is 100%, so the schema fully documents all parameters. The description adds no parameter-specific information beyond what's in the schema. However, it implicitly contextualizes parameters by mentioning the interception process and setup tools, but doesn't explain individual param roles. Baseline 3 is appropriate given high schema coverage.

Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.

Purpose5/5

Does the description clearly state what the tool does and how it differs from similar tools?

The description clearly states the specific action ('Intercept a specific Android app using Frida dynamic instrumentation') and distinguishes it from siblings like 'frida_ios_intercept' (different platform) and 'intercept_android_adb' (different method). It specifies the technology (Frida) and target (Android app).

Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.

Usage Guidelines5/5

Does the description explain when to use this tool, when not to, or what alternatives exist?

The description explicitly states prerequisites ('Requires a rooted device with Frida server running') and directs to specific sibling tools for setup ('use frida_android_setup and frida_android_launch first'). It also implies when to use this tool vs. alternatives by specifying the Frida-based Android interception method.

Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.

Install Server

Other Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/fdciabdul/httptoolkit-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server