interceptor_frida_detach
Detach Frida sessions from Android apps to remove injected scripts and restore original app behavior during network traffic analysis.
Instructions
Detach Frida session from an Android app, removing injected scripts.
Input Schema
TableJSON Schema
| Name | Required | Description | Default |
|---|---|---|---|
| target_id | Yes | Target ID from interceptor_frida_attach |
Implementation Reference
- src/tools/interceptors.ts:694-712 (handler)The tool 'interceptor_frida_detach' is registered and implemented within the server.tool block in src/tools/interceptors.ts. It calls interceptorManager.deactivate to detach the Frida session.
server.tool( "interceptor_frida_detach", "Detach Frida session from an Android app, removing injected scripts.", { target_id: z.string().describe("Target ID from interceptor_frida_attach"), }, async ({ target_id }) => { try { await interceptorManager.deactivate("android-frida", target_id); return { content: [{ type: "text", text: JSON.stringify({ status: "success", message: `Frida session ${target_id} detached.` }), }], }; } catch (e) { return { content: [{ type: "text", text: JSON.stringify({ status: "error", error: errorToString(e) }) }] }; } },