WAIRZ¶
AI-assisted firmware reverse engineering and security assessment platform.
Upload firmware images, unpack them, explore the filesystem, analyze binaries, and conduct security assessments — all powered by AI analysis via Model Context Protocol (MCP).
Connect Claude Code or Claude Desktop to WAIRZ's 60+ analysis tools through MCP, and use your own Claude subscription for AI-driven firmware security research.
Key Features¶
-
File Explorer
Browse extracted filesystems with a virtual tree, view text/binary/hex content, and search across files.
-
Binary Analysis
Disassemble and decompile binaries using Ghidra headless, with cross-references, dataflow tracing, and stack layout analysis.
-
Security Assessment
Detect hardcoded credentials, crypto material, setuid binaries, insecure configs, and weak permissions.
-
SBOM & CVE Scanning
Generate Software Bill of Materials and scan components against the NVD for known vulnerabilities.
-
Emulation
Boot firmware in QEMU (user-mode or system-mode) in isolated containers, with GDB debugging support.
-
Fuzzing
AFL++ with QEMU mode for cross-architecture binary fuzzing, with automatic dictionary/corpus generation and crash triage.
-
Firmware Comparison
Diff filesystem trees, binaries, and decompiled functions across firmware versions for patch analysis.
-
UART Console
Connect to physical devices via a host-side serial bridge for interactive console access.
-
AI Analysis via MCP
60+ analysis tools exposed to Claude for autonomous security research — from filesystem exploration to vulnerability discovery.
-
Findings & Reports
Record security findings with severity ratings and evidence, export as Markdown or PDF.
Public Beta
WAIRZ is currently in public beta. You may encounter bugs or rough edges. If you run into any issues, please open an issue on GitHub or reach out at andrew@digitalandrew.io.
WAIRZ is currently designed for embedded Linux firmware samples. Support for RTOS and bare-metal firmware is planned for future releases.
Quick Start¶
git clone https://github.com/digitalandrew/wairz.git
cd wairz
cp .env.example .env
docker compose up --build
Then open http://localhost:3000 to access the web interface.
See the Installation Guide for detailed setup instructions, or jump to Connecting AI to set up Claude with MCP.
How It Works¶
Claude Code / Claude Desktop
|
| MCP (stdio)
v
+------------------+ +------------------------------------+
| wairz-mcp |---->| FastAPI Backend |
| (MCP server) | | |
| 60+ tools | | Services: firmware, analysis, |
+------------------+ | emulation, fuzzing, sbom, uart |
| |
| Ghidra headless - QEMU - AFL++ |
+-----------+--------------------------|
|
+--------------+ +----------------+----------------+
| React SPA |--->| PostgreSQL | Redis |
| (Frontend) | | | |
+--------------+ +----------------+----------------+
- Upload a firmware image through the web UI
- WAIRZ unpacks the firmware automatically (SquashFS, JFFS2, UBIFS, CramFS, ext, CPIO)
- Explore the extracted filesystem, analyze binaries, and assess security — through the browser or AI
- Connect Claude via MCP to run autonomous analysis with 60+ specialized tools
License¶
WAIRZ is open source under the AGPL-3.0 License.