Docs·IDE · Model Context Protocol·aether-mcp

aether-mcp

Drop the Aether tools into Claude Desktop, Cursor, Cline, Zed, Continue — or any MCP-compatible client. 11 specialized tools (chat, deobfuscate, explain code/disasm, identify pattern, suggest bypass, image gen, more) appear inside your existing AI chat. When the main AI refuses, your client routes to Aether automatically.

1

What is MCP?

The Model Context Protocol is a JSON-RPC standard from Anthropic for letting AI clients call out to external tool servers. aether-mcp is one of those servers — when you add it to your AI client's config, the client sees a set of tools like aether_chat, aether_deobfuscate_js, etc., and can invoke them mid-conversation.

The user-facing effect: stay in Claude Desktop / Cursor / Cline / Zed for normal work, and when you ask a question the main AI declines to answer, it routes the same prompt through Aether and shows you the answer in the same chat tab. No new app to learn, no context-switch to a browser.

2

Prerequisites

  • Node 18 or newer (the MCP server runs as npx -y aether-mcp)
  • An AI client with MCP support: Claude Desktop, Cursor, Cline, Zed, Continue, or any other
  • An Aether API key — generate one at https://trynoguard.com/account. Keys start with ak_live_.
3

Per-client configuration

Every MCP client has the same essential config shape. Drop this snippet into the right file, restart the client, and the Aether tools appear. Replace ak_live_… with your real key.

Claude Desktop

Edit ~/Library/Application Support/Claude/claude_desktop_config.json on macOS, or %APPDATA%\Claude\claude_desktop_config.json on Windows.

json
{ "mcpServers": { "aether": { "command": "npx", "args": ["-y", "aether-mcp"], "env": { "AETHER_API_KEY": "ak_live_..." } } } }

Cursor

Edit ~/.cursor/mcp.json (global) or .cursor/mcp.json in a project (per-project).

json
{ "mcpServers": { "aether": { "command": "npx", "args": ["-y", "aether-mcp"], "env": { "AETHER_API_KEY": "ak_live_..." } } } }

Cline (VS Code extension)

In Cline's settings, click MCP Servers, then Edit MCP Settings. That opens cline_mcp_settings.json:

json
{ "mcpServers": { "aether": { "command": "npx", "args": ["-y", "aether-mcp"], "env": { "AETHER_API_KEY": "ak_live_..." }, "disabled": false, "autoApprove": [] } } }

Zed

Open SettingsOpen Settings JSON and add this under context_servers:

json
{ "context_servers": { "aether": { "command": { "path": "npx", "args": ["-y", "aether-mcp"], "env": { "AETHER_API_KEY": "ak_live_..." } } } } }

Continue

Edit ~/.continue/config.json and add to the mcpServers array:

json
{ "mcpServers": [ { "name": "aether", "command": "npx", "args": ["-y", "aether-mcp"], "env": { "AETHER_API_KEY": "ak_live_..." } } ] }
4

The 11 tools

These appear in your AI client's tool panel after restart. Most are uncensored versions of the kind of analysis other AIs refuse — RE, deobfuscation, anti-cheat, malware analysis.

aether_chatauto

Direct uncensored chat — pass any prompt and get a real answer with no refusal layer. The fallback when other tools don't fit.

aether_explain_codeauto

Explain any source code or decompiled C (Hex-Rays output, Ghidra output, raw source). Identifies patterns like CRC checks, license checks, anti-debug routines.

aether_explain_disasmauto

Walk through x86, x86_64, ARM, ARM64, MIPS, PowerPC disassembly line-by-line. Identifies calling conventions, stack layout, anti-debug tricks.

aether_identify_patternauto

Given strings, imports, entry-point bytes, or a code snippet — names the technique or family. Recognizes VMProtect, Themida, Denuvo, Easy Anti-Cheat, BattlEye, custom packers, crypto algorithms, malware families.

aether_suggest_bypassauto

Concrete bypass strategies for integrity checks, anti-cheats, DRM, license checks, obfuscators. Pairs with identify_pattern for the full RE workflow.

aether_engine_analyzeauto

Game engine specific analysis — Unity, Unreal, Source, Source 2, Godot. Memory layouts, tick refresh patterns, common external-reader entry points.

aether_protocol_dissectauto

Packet capture / custom binary protocol dissection. Identifies framing, length fields, opcodes, encryption, compression.

aether_deobfuscate_jsauto

Obfuscator.io, JScrambler, JScrambler-clones, custom rolling-key obfuscators. Returns cleaned code + analysis of what the original was protecting.

aether_explain_wasmauto

WebAssembly module analysis. Anti-bot WASM (Cloudflare Turnstile, Datadome, PerimeterX), DRM WASM, browser fingerprinting WASM.

aether_imagineauto

Unrestricted image generation. Returns base64 PNG. Bypasses the typical "I can't generate that kind of content" refusals on artistic / mature / brand-violating prompts.

aether_balanceauto

Credit balance + rate-limit headroom check. The AI client can use this proactively (e.g. "before doing 5 expensive deobfuscations, check the balance").

5

IDA Pro pairing

The killer use case: pair aether-mcp with ida-pro-mcp (mrexodia's open-source MCP server for IDA Pro's analysis API). Both run in your Claude Desktop / Cursor session simultaneously.

You ask things like:

Decompile sub_18000A4C0 from IDA, identify what kind
of integrity check it is, and suggest a bypass.

Your AI client orchestrates: ida-pro-mcp calls IDA to get the C output → passes it to aether_identify_pattern → passes the result to aether_suggest_bypass. Three steps, zero refusals, all in one chat message.

json
{ "mcpServers": { "aether": { "command": "npx", "args": ["-y", "aether-mcp"], "env": { "AETHER_API_KEY": "ak_live_..." } }, "ida-pro": { "command": "uv", "args": ["run", "ida-pro-mcp"] } } }
6

Pricing

Each tool call uses your Aether credits. Typical costs:

ToolTypical credits per call
aether_chat8 – 60 (depends on prompt + reply length)
aether_explain_code / explain_disasm20 – 80
aether_deobfuscate_js / explain_wasm30 – 150 (long inputs)
aether_identify_pattern / suggest_bypass15 – 50
aether_imagine100 (fixed)
aether_balanceFree

Plans start at $15/month for 2,500 credits, or top up $5 = 1,500 credits on the free tier. Top-up credits never expire.

7

Safety & rate limits

  • Per-key rate limit. FREE: 30/hr · STARTER: 200/hr · PRO: 1,000/hr · UNLIMITED: 100,000/hr. Sliding 60-min window, returned as response headers.
  • Per-key IP fingerprinting. The MCP server runs locally and reaches our API over HTTPS. Each request is tagged with a SHA-256 hash of the source IP, so abuse from a single key across many machines is detectable.
  • Credit reservation pattern. Each tool call reserves the worst-case cost up front, then refunds the unused portion. Concurrent fan-out attacks can't over-spend.
  • Identity scrubbing. Server-side filter strips any leaked underlying-model brand names from responses before they reach the MCP server. Multi-language coverage.
8

Troubleshooting

Tools don't appear in my AI client after restart
First check the client's MCP debug log. Most clients show a separate panel for MCP server status. Common issues: malformed JSON in the config (a stray comma), wrong path to the config file, the AI client wasn't fully quit before restart (background-staying instances re-use the old config).
Error: NO_API_KEY
The AETHER_API_KEY env var wasn't passed through. Make sure the key is set under env in the MCP server config block, not at the top level.
Error: HTTP 401 — invalid key
Key was revoked or has a typo. Generate a fresh one at https://trynoguard.com/account, update your config, restart the client.
Error: HTTP 402 — out of credits
Top up at https://trynoguard.com/pay. Free tier auto-refreshes 5 credits/day. Top-ups never expire.
Error: HTTP 429 — rate limited
Per-hour rate limit hit. Wait a minute and try again, or upgrade your plan. Limits reset on a sliding 60-min window.
`npx -y aether-mcp` is slow on every tool call
npx -y downloads the package each invocation. For frequent use, install globally: npm i -g aether-mcp and change command to aether-mcp (no args).
Can I use Aether MCP from a corporate network with strict TLS?
Yes. The MCP server reaches https://trynoguard.com over HTTPS like a normal HTTP client. If your proxy intercepts TLS, set the standard Node env vars: HTTPS_PROXY and NODE_EXTRA_CA_CERTS.
Self-hosting / pointing at a non-trynoguard backend
Set AETHER_BASE_URL in the env block. The endpoint shape is /api/v1/* as documented elsewhere.
aether-mcp — install & reference | Aether · Aether