What is MCP?
The Model Context Protocol is a JSON-RPC standard from Anthropic for letting AI clients call out to external tool servers. aether-mcp is one of those servers — when you add it to your AI client's config, the client sees a set of tools like aether_chat, aether_deobfuscate_js, etc., and can invoke them mid-conversation.
The user-facing effect: stay in Claude Desktop / Cursor / Cline / Zed for normal work, and when you ask a question the main AI declines to answer, it routes the same prompt through Aether and shows you the answer in the same chat tab. No new app to learn, no context-switch to a browser.
Prerequisites
- Node 18 or newer (the MCP server runs as
npx -y aether-mcp) - An AI client with MCP support: Claude Desktop, Cursor, Cline, Zed, Continue, or any other
- An Aether API key — generate one at https://trynoguard.com/account. Keys start with
ak_live_.
Per-client configuration
Every MCP client has the same essential config shape. Drop this snippet into the right file, restart the client, and the Aether tools appear. Replace ak_live_… with your real key.
Claude Desktop
Edit ~/Library/Application Support/Claude/claude_desktop_config.json on macOS, or %APPDATA%\Claude\claude_desktop_config.json on Windows.
json{ "mcpServers": { "aether": { "command": "npx", "args": ["-y", "aether-mcp"], "env": { "AETHER_API_KEY": "ak_live_..." } } } }
Cursor
Edit ~/.cursor/mcp.json (global) or .cursor/mcp.json in a project (per-project).
json{ "mcpServers": { "aether": { "command": "npx", "args": ["-y", "aether-mcp"], "env": { "AETHER_API_KEY": "ak_live_..." } } } }
Cline (VS Code extension)
In Cline's settings, click MCP Servers, then Edit MCP Settings. That opens cline_mcp_settings.json:
json{ "mcpServers": { "aether": { "command": "npx", "args": ["-y", "aether-mcp"], "env": { "AETHER_API_KEY": "ak_live_..." }, "disabled": false, "autoApprove": [] } } }
Zed
Open Settings → Open Settings JSON and add this under context_servers:
json{ "context_servers": { "aether": { "command": { "path": "npx", "args": ["-y", "aether-mcp"], "env": { "AETHER_API_KEY": "ak_live_..." } } } } }
Continue
Edit ~/.continue/config.json and add to the mcpServers array:
json{ "mcpServers": [ { "name": "aether", "command": "npx", "args": ["-y", "aether-mcp"], "env": { "AETHER_API_KEY": "ak_live_..." } } ] }
The 11 tools
These appear in your AI client's tool panel after restart. Most are uncensored versions of the kind of analysis other AIs refuse — RE, deobfuscation, anti-cheat, malware analysis.
aether_chatautoDirect uncensored chat — pass any prompt and get a real answer with no refusal layer. The fallback when other tools don't fit.
aether_explain_codeautoExplain any source code or decompiled C (Hex-Rays output, Ghidra output, raw source). Identifies patterns like CRC checks, license checks, anti-debug routines.
aether_explain_disasmautoWalk through x86, x86_64, ARM, ARM64, MIPS, PowerPC disassembly line-by-line. Identifies calling conventions, stack layout, anti-debug tricks.
aether_identify_patternautoGiven strings, imports, entry-point bytes, or a code snippet — names the technique or family. Recognizes VMProtect, Themida, Denuvo, Easy Anti-Cheat, BattlEye, custom packers, crypto algorithms, malware families.
aether_suggest_bypassautoConcrete bypass strategies for integrity checks, anti-cheats, DRM, license checks, obfuscators. Pairs with identify_pattern for the full RE workflow.
aether_engine_analyzeautoGame engine specific analysis — Unity, Unreal, Source, Source 2, Godot. Memory layouts, tick refresh patterns, common external-reader entry points.
aether_protocol_dissectautoPacket capture / custom binary protocol dissection. Identifies framing, length fields, opcodes, encryption, compression.
aether_deobfuscate_jsautoObfuscator.io, JScrambler, JScrambler-clones, custom rolling-key obfuscators. Returns cleaned code + analysis of what the original was protecting.
aether_explain_wasmautoWebAssembly module analysis. Anti-bot WASM (Cloudflare Turnstile, Datadome, PerimeterX), DRM WASM, browser fingerprinting WASM.
aether_imagineautoUnrestricted image generation. Returns base64 PNG. Bypasses the typical "I can't generate that kind of content" refusals on artistic / mature / brand-violating prompts.
aether_balanceautoCredit balance + rate-limit headroom check. The AI client can use this proactively (e.g. "before doing 5 expensive deobfuscations, check the balance").
IDA Pro pairing
The killer use case: pair aether-mcp with ida-pro-mcp (mrexodia's open-source MCP server for IDA Pro's analysis API). Both run in your Claude Desktop / Cursor session simultaneously.
You ask things like:
Decompile sub_18000A4C0 from IDA, identify what kind
of integrity check it is, and suggest a bypass.Your AI client orchestrates: ida-pro-mcp calls IDA to get the C output → passes it to aether_identify_pattern → passes the result to aether_suggest_bypass. Three steps, zero refusals, all in one chat message.
json{ "mcpServers": { "aether": { "command": "npx", "args": ["-y", "aether-mcp"], "env": { "AETHER_API_KEY": "ak_live_..." } }, "ida-pro": { "command": "uv", "args": ["run", "ida-pro-mcp"] } } }
Pricing
Each tool call uses your Aether credits. Typical costs:
| Tool | Typical credits per call |
|---|---|
| aether_chat | 8 – 60 (depends on prompt + reply length) |
| aether_explain_code / explain_disasm | 20 – 80 |
| aether_deobfuscate_js / explain_wasm | 30 – 150 (long inputs) |
| aether_identify_pattern / suggest_bypass | 15 – 50 |
| aether_imagine | 100 (fixed) |
| aether_balance | Free |
Plans start at $15/month for 2,500 credits, or top up $5 = 1,500 credits on the free tier. Top-up credits never expire.
Safety & rate limits
- Per-key rate limit. FREE: 30/hr · STARTER: 200/hr · PRO: 1,000/hr · UNLIMITED: 100,000/hr. Sliding 60-min window, returned as response headers.
- Per-key IP fingerprinting. The MCP server runs locally and reaches our API over HTTPS. Each request is tagged with a SHA-256 hash of the source IP, so abuse from a single key across many machines is detectable.
- Credit reservation pattern. Each tool call reserves the worst-case cost up front, then refunds the unused portion. Concurrent fan-out attacks can't over-spend.
- Identity scrubbing. Server-side filter strips any leaked underlying-model brand names from responses before they reach the MCP server. Multi-language coverage.
Troubleshooting
Tools don't appear in my AI client after restart
Error: NO_API_KEY
AETHER_API_KEY env var wasn't passed through. Make sure the key is set under env in the MCP server config block, not at the top level.Error: HTTP 401 — invalid key
https://trynoguard.com/account, update your config, restart the client.Error: HTTP 402 — out of credits
https://trynoguard.com/pay. Free tier auto-refreshes 5 credits/day. Top-ups never expire.Error: HTTP 429 — rate limited
`npx -y aether-mcp` is slow on every tool call
npx -y downloads the package each invocation. For frequent use, install globally: npm i -g aether-mcp and change command to aether-mcp (no args).Can I use Aether MCP from a corporate network with strict TLS?
https://trynoguard.com over HTTPS like a normal HTTP client. If your proxy intercepts TLS, set the standard Node env vars: HTTPS_PROXY and NODE_EXTRA_CA_CERTS.Self-hosting / pointing at a non-trynoguard backend
AETHER_BASE_URL in the env block. The endpoint shape is /api/v1/* as documented elsewhere.Related docs
- MCP setup walkthrough
Step-by-step install with screenshots, per AI client. The original walkthrough page.
- aether CLI reference
Same Aether tools as a terminal command-line agent.
- DevTools extension
Same Aether tools inside Chrome / Firefox DevTools.
- All docs
Index of every Aether surface — CLI, MCP, DevTools, REST API.