Skip to content

Wairz - Every Firmware Has Secrets... WAIRZ Finds Them

WAIRZ

AI-assisted firmware reverse engineering and security assessment platform.

Upload firmware images, unpack them, explore the filesystem, analyze binaries, and conduct security assessments — all powered by AI analysis via Model Context Protocol (MCP).

Connect Claude Code or Claude Desktop to WAIRZ's 60+ analysis tools through MCP, and use your own Claude subscription for AI-driven firmware security research.


Key Features

  • File Explorer

    Browse extracted filesystems with a virtual tree, view text/binary/hex content, and search across files.

  • Binary Analysis

    Disassemble and decompile binaries using Ghidra headless, with cross-references, dataflow tracing, and stack layout analysis.

  • Security Assessment

    Detect hardcoded credentials, crypto material, setuid binaries, insecure configs, and weak permissions.

  • SBOM & CVE Scanning

    Generate Software Bill of Materials and scan components against the NVD for known vulnerabilities.

  • Emulation

    Boot firmware in QEMU (user-mode or system-mode) in isolated containers, with GDB debugging support.

  • Fuzzing

    AFL++ with QEMU mode for cross-architecture binary fuzzing, with automatic dictionary/corpus generation and crash triage.

  • Firmware Comparison

    Diff filesystem trees, binaries, and decompiled functions across firmware versions for patch analysis.

  • UART Console

    Connect to physical devices via a host-side serial bridge for interactive console access.

  • AI Analysis via MCP

    60+ analysis tools exposed to Claude for autonomous security research — from filesystem exploration to vulnerability discovery.

  • Findings & Reports

    Record security findings with severity ratings and evidence, export as Markdown or PDF.


Public Beta

WAIRZ is currently in public beta. You may encounter bugs or rough edges. If you run into any issues, please open an issue on GitHub or reach out at andrew@digitalandrew.io.

WAIRZ is currently designed for embedded Linux firmware samples. Support for RTOS and bare-metal firmware is planned for future releases.


Quick Start

git clone https://github.com/digitalandrew/wairz.git
cd wairz
cp .env.example .env
docker compose up --build

Then open http://localhost:3000 to access the web interface.

See the Installation Guide for detailed setup instructions, or jump to Connecting AI to set up Claude with MCP.


How It Works

Claude Code / Claude Desktop
        |
        | MCP (stdio)
        v
+------------------+     +------------------------------------+
|   wairz-mcp      |---->|         FastAPI Backend             |
|  (MCP server)    |     |                                      |
|  60+ tools       |     |  Services: firmware, analysis,       |
+------------------+     |  emulation, fuzzing, sbom, uart      |
                         |                                      |
                         |  Ghidra headless - QEMU - AFL++      |
                         +-----------+--------------------------|
                                     |
+--------------+    +----------------+----------------+
|   React SPA  |--->|  PostgreSQL    |  Redis         |
|  (Frontend)  |    |                |                |
+--------------+    +----------------+----------------+
  1. Upload a firmware image through the web UI
  2. WAIRZ unpacks the firmware automatically (SquashFS, JFFS2, UBIFS, CramFS, ext, CPIO)
  3. Explore the extracted filesystem, analyze binaries, and assess security — through the browser or AI
  4. Connect Claude via MCP to run autonomous analysis with 60+ specialized tools

License

WAIRZ is open source under the AGPL-3.0 License.