zhizhuodemao

微信小程序逆向工程 MCP 服务器,让你的 AI 编码助手(如 Claude、Cursor、Antigravity)能够直接通过 Chrome DevTools Protocol (CDP) 调试和分析微信小程序(包括微信开发者工具或 PC 端微信小程序)中的 JavaScript 代码。

10
2
69% credibility
Found Apr 26, 2026 at 10 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

An MCP server that connects AI coding assistants to WeChat Mini Program debuggers for inspecting JavaScript code, network activity, and setting breakpoints.

How It Works

1
🔍 Discover the debugging helper

You find a handy tool that lets your AI assistant peek inside WeChat Mini Programs to understand their hidden code and tricks.

2
🛠️ Prepare your Mini Program

You open the Mini Program in its developer tool and unlock the secret debugging view using a simple unlocker.

3
🔗 Connect the helper tool

You start the helper with a quick launch, linking it to your Mini Program's debugging window so it can watch everything.

4
🤖 Team up with your AI

You introduce the helper to your AI coding buddy like Claude or Cursor, so now your AI can explore and ask questions about the code.

5
🕵️ Dive into the code

Your AI lists web calls, searches scripts, sets pauses on tricky spots, and reveals encryption secrets or data flows.

Unlock the mysteries

You now fully understand the Mini Program's inner workings and can recreate its features or fixes in your own projects.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 10 to 10 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is miniapp-cdp-mcp?

This Python MCP server bridges Chrome DevTools Protocol (CDP) to WeChat Mini Programs, letting AI coding assistants like Claude or Cursor debug JavaScript in real-time via tools in WeChat DevTools or PC clients. You expose a debug port, point the server at it, and gain access to network requests, WebSocket traffic, script sources, and breakpoints—even on minified code. It's zero-install via uvx, plugging straight into MCP configs for VSCode, Cursor, or Claude Desktop.

Why is it gaining traction?

Unlike raw CDP clients, it auto-infers MiniApp targets (logic vs. render threads), captures XHR/Fetch with initiators, and sets text-based breakpoints that hunt obfuscated JS. AI agents call tools like list_network_requests or set_breakpoint_on_text for guided reverse engineering, skipping manual DevTools fiddling. Fresh MCP integrations beat clunky proxies, especially for Python devs eyeing mcp github copilot vscode setups.

Who should use this?

Security researchers cracking MiniApp encryption, like tracing mina_edata payloads in Vipshop apps. Reverse engineers debugging AppService logic or WebView renders without source. AI-assisted devs in Cursor or GitHub Copilot IntelliJ workflows targeting WeChat ecosystems.

Verdict

Worth a spin for MiniApp pros—docs shine with workflows and MCP github server list examples—but 10 stars and 0.7% credibility flag it as early alpha. Test locally first; pair with mcp github docs for stability.

(187 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.