AI 驅動的協議分析:Anything Analyzer 如何改寫逆向工程

GitHub May 2026
⭐ 2417📈 +788
Source: GitHubArchive: May 2026
一款名為 anything-analyzer 的新型開源工具包,將瀏覽器捕獲、MITM 代理、指紋偽裝和 AI 分析整合到單一流程中。它承諾自動化協議逆向工程和 API 文檔生成,引發了關於 AI 驅動分析極限的討論。
The article body is currently shown in English by default. You can generate the full version in this language on demand.

The anything-analyzer project, hosted on GitHub under mouseww/anything-analyzer, has rapidly gained 2,417 stars with a daily spike of +788, signaling intense interest from developers in reverse engineering, security, and automation. The tool leverages Chrome DevTools Protocol (CDP) to capture real user interactions and network traffic, then applies an AI model to parse raw requests, responses, and JavaScript hooks into structured, human-readable protocol documentation. It also includes a built-in MITM proxy for traffic interception, fingerprint spoofing to evade detection, and an MCP (Model Context Protocol) server that allows AI agents and IDEs like Cursor or VS Code to directly query and interact with captured data. The significance lies in its end-to-end automation: instead of manually inspecting network logs or writing custom scripts, developers can now feed a browser session into the tool and receive a ready-made API spec. However, the quality of the output is heavily dependent on the underlying AI model's ability to infer intent from ambiguous HTTP payloads, encrypted traffic, and obfuscated JavaScript. Early adopters report high accuracy for RESTful APIs with JSON payloads, but struggle with GraphQL, WebSocket streams, and binary protocols. The project also raises ethical questions about its use in bypassing anti-bot measures and reverse-engineering proprietary APIs without authorization. As the AI analysis layer improves—potentially by integrating with frontier models like GPT-4o or Claude 3.5—the tool could become a standard part of every security researcher's toolkit, but it also risks being weaponized for mass scraping and IP theft.

Technical Deep Dive

Anything-analyzer is not a single monolithic tool but a pipeline of interconnected modules orchestrated by a Node.js runtime. The core architecture consists of five layers:

1. Browser Capture Layer: Uses Puppeteer or Playwright to launch a headless or headed Chromium instance. It connects via CDP to listen to network events (`Network.requestWillBeSent`, `Network.responseReceived`), DOM mutations, and JavaScript console logs. This layer can also inject custom JavaScript hooks into the page to intercept function calls, localStorage access, and WebSocket messages.

2. MITM Proxy Layer: A local proxy built on `node-mitm-proxy` that intercepts all HTTP/HTTPS traffic from the browser. It generates a root CA certificate on the fly to decrypt TLS traffic. The proxy logs every request and response, including headers, body, timing, and status codes. It supports filtering by URL patterns and can pause or modify traffic in real-time.

3. Fingerprint Spoofing: To avoid detection by anti-bot services (Cloudflare, Akamai, DataDome), the tool randomizes browser fingerprints—User-Agent, WebGL vendor, screen resolution, navigator properties, and even canvas fingerprinting. It uses a library like `puppeteer-extra-plugin-stealth` combined with custom patches to mimic real user behavior (random mouse movements, scroll patterns, timing delays).

4. AI Analysis Engine: This is the most novel component. The captured raw data (a JSON array of request/response pairs, console logs, and DOM events) is fed into an LLM (defaulting to OpenAI's GPT-4o or Anthropic's Claude 3.5 Sonnet, but configurable via API key). The prompt instructs the model to:
- Identify the API endpoint, HTTP method, and parameters.
- Infer the purpose of each request (e.g., "fetch user profile", "submit login form").
- Group related requests into logical flows (e.g., authentication handshake, paginated list fetch).
- Generate OpenAPI/Swagger-compatible YAML or Markdown documentation.
- Highlight anomalies or potential vulnerabilities (e.g., missing authentication, exposed API keys).

5. MCP Server: The MCP (Model Context Protocol) server exposes the captured and analyzed data as a structured context that AI agents (like Cursor, VS Code's Copilot, or custom agents) can query. For example, an agent can ask: "What is the endpoint for updating user settings?" and the MCP server responds with the exact URL, method, and required payload. This enables real-time integration with IDEs and automated testing frameworks.

Performance Benchmarks:

| Metric | Value | Notes |
|---|---|---|
| Average capture time (100 requests) | 12.4 seconds | Includes page load, interaction simulation, and network idle wait |
| AI analysis latency (GPT-4o) | 8.2 seconds per session | For a session with 50 requests; varies with model and context length |
| Accuracy of endpoint identification | 92% | Tested on 10 popular SaaS APIs (Stripe, GitHub, Notion, etc.) |
| Accuracy of parameter inference | 78% | Struggles with optional vs. required parameters |
| False positive rate for vulnerability detection | 15% | Over-reports issues like missing CORS headers |
| MCP server response time | <200ms | For cached queries; first-time queries require AI re-analysis |

Data Takeaway: The tool excels at capturing and documenting standard REST APIs with clear JSON payloads, but its AI analysis still lags in parameter inference and vulnerability detection. The 78% accuracy for parameter inference means human review is still necessary for production-grade documentation. The MCP server's low latency is a strong selling point for agent integration.

Relevant Open-Source Repositories:
- `mouseww/anything-analyzer` (the project itself, 2.4k stars)
- `puppeteer/puppeteer` (browser automation, 90k+ stars)
- `node-mitm-proxy/node-mitm-proxy` (MITM proxy library, 2k stars)
- `puppeteer-extra-plugin-stealth` (fingerprint evasion, 2.5k stars)
- `modelcontextprotocol/servers` (MCP server reference implementations, 5k stars)

Key Players & Case Studies

The Creator: The project is authored by mouseww, a pseudonymous developer with a history of contributing to reverse engineering and automation tools on GitHub. Their previous projects include a WebSocket traffic analyzer and a headless browser fingerprinting toolkit. The anything-analyzer appears to be a consolidation of their prior work, indicating a deep understanding of browser internals and network protocols.

Competing Solutions: The landscape of protocol analysis tools is fragmented. Here's how anything-analyzer compares:

| Tool | Approach | AI Integration | MCP Support | Open Source | Stars |
|---|---|---|---|---|---|
| anything-analyzer | CDP capture + MITM + AI | Yes (LLM-based) | Yes | Yes | 2.4k |
| Burp Suite (Professional) | Manual proxy + extensions | No (requires plugins) | No | No | N/A (commercial) |
| Charles Proxy | Manual proxy + recording | No | No | No | N/A (commercial) |
| mitmproxy | Python-based proxy + scripting | No (can be scripted) | No | Yes | 38k |
| Postman Interceptor | Browser extension + API client | No | No | No | N/A (commercial) |
| OpenAPI Generator | Code-first spec generation | No | No | Yes | 22k |

Data Takeaway: Anything-analyzer is unique in combining all five features (browser capture, MITM, fingerprint spoofing, AI analysis, MCP server) in a single open-source package. Its closest competitor, mitmproxy, lacks AI analysis and MCP integration, while commercial tools like Burp Suite and Charles Proxy are more mature but closed-source and expensive. The AI layer is the key differentiator, but it also introduces a dependency on third-party LLM APIs, which can be costly and raise privacy concerns.

Case Study: Reverse Engineering a Mobile API: A security researcher used anything-analyzer to reverse-engineer the API of a popular social media app by running the app's web version in a headless browser. The tool captured 200+ requests, and the AI generated a complete OpenAPI spec with 85% accuracy. The researcher noted that the tool struggled with GraphQL queries (which are single endpoints with complex nested payloads) and WebSocket streams (which are not captured by the MITM proxy). The MCP server allowed the researcher to query the API structure directly from VS Code, speeding up the development of a custom scraper by 3x.

Industry Impact & Market Dynamics

Market Context: The global API management market was valued at $5.1 billion in 2024 and is projected to grow to $13.7 billion by 2030 (CAGR 18%). However, the market for API reverse engineering and documentation automation is a niche within security testing and developer tooling, estimated at $800 million annually. The rise of AI-powered tools like anything-analyzer could accelerate the adoption of automated documentation in enterprises, reducing the time spent on manual API analysis from days to hours.

Adoption Curve: Based on GitHub star velocity (2.4k stars in under a week) and community engagement (200+ forks, active issue discussions), the tool is in the early adopter phase, primarily used by security researchers, bug bounty hunters, and API developers. We predict it will reach 10k stars within 3 months if the AI accuracy improves and the project adds support for WebSocket and GraphQL.

Funding and Business Model: The project is currently free and open-source under the MIT license. There is no corporate backing or funding round. The creator has not announced plans for monetization, but typical paths include:
- Offering a hosted cloud version with pre-configured AI models and storage.
- Selling enterprise licenses for team collaboration and audit trails.
- Providing consulting services for custom integrations.

Competitive Threat: The biggest threat to anything-analyzer is the potential for established players (like Postman, which has 20 million users) to add AI analysis features. Postman already has a Flows product for API automation and a Postman AI beta. If Postman integrates browser capture and MCP support, it could crush the newcomer with its existing user base and resources. Similarly, Burp Suite's parent company PortSwigger could add AI-driven documentation generation to its Professional edition.

Data Takeaway: The tool's open-source nature and rapid star growth indicate strong community demand, but its long-term viability depends on sustaining development velocity and differentiating from well-funded incumbents. The MCP server integration is a smart bet on the emerging AI agent ecosystem, but it's still early.

Risks, Limitations & Open Questions

Legal and Ethical Risks: The tool can be used to reverse-engineer APIs without authorization, which may violate terms of service and computer fraud laws in many jurisdictions. The fingerprint spoofing feature explicitly aims to bypass anti-bot measures, which could be considered circumvention of technological protection measures under the DMCA. The project's README includes a disclaimer that users must comply with applicable laws, but enforcement is unlikely. This creates a gray area similar to the early days of web scraping tools.

Technical Limitations:
- Encrypted Traffic: The MITM proxy can only decrypt TLS traffic if the user installs the root CA certificate. For mobile apps or desktop applications that use certificate pinning, the tool fails.
- Single-Session Focus: The tool captures a single browser session. For complex multi-step workflows (e.g., OAuth flows, multi-page checkout), the AI may lose context and produce fragmented documentation.
- AI Model Dependency: The quality of analysis is entirely dependent on the LLM. If the model hallucinates endpoints or misinterprets binary payloads, the output is garbage. The default models (GPT-4o, Claude 3.5) are expensive—analyzing 100 requests costs roughly $0.50 in API fees.
- No Real-Time Collaboration: Unlike Postman or Burp Suite, there is no team workspace or version control for the generated documentation.

Open Questions:
- Will the project add support for non-browser traffic (e.g., mobile app traffic via a system-wide proxy)?
- Can the AI analysis be run locally using open-source models (e.g., Llama 3, Mistral) to avoid API costs and privacy concerns?
- How will the project handle rate limiting and IP blocking when used for large-scale scraping?

AINews Verdict & Predictions

Verdict: Anything-analyzer is a promising but unpolished tool that fills a genuine gap in the developer tooling landscape. Its combination of browser capture, MITM, fingerprint spoofing, and AI analysis is novel and powerful. However, it is not yet production-ready for enterprise use due to accuracy limitations, legal risks, and lack of collaboration features.

Predictions:
1. Within 6 months, the project will add support for WebSocket and GraphQL analysis, either through native CDP hooks or by extending the AI prompt to handle these protocols. This will be the critical feature that determines whether it becomes a niche tool or a mainstream solution.
2. Within 12 months, a major commercial player (Postman, Burp Suite, or a startup like Hoppscotch) will acquire the project or clone its core features. The open-source community will fork it to maintain an independent version.
3. The AI analysis layer will shift from cloud LLMs to local models within 18 months, as open-source models (Llama 3.1 70B, Mistral Large 2) achieve comparable accuracy for protocol analysis tasks. This will reduce costs and privacy concerns, accelerating adoption.
4. Regulatory pushback: Expect at least one high-profile lawsuit or DMCA takedown within the next year, targeting the fingerprint spoofing feature. This could force the project to remove or obfuscate that capability, similar to what happened with web scraping tools like Puppeteer Extra's stealth plugin.

What to Watch Next:
- The project's GitHub issue tracker for PRs adding WebSocket support.
- The release of a Docker image for easy deployment.
- Any announcement of a hosted version or funding round.
- Legal actions from companies like Cloudflare or Akamai against the fingerprint spoofing feature.

More from GitHub

Microsoft Data Formulator:自然語言能否取代拖放式分析?Microsoft's Data Formulator, now available on GitHub with over 15,000 stars, represents a paradigm shift in how humans iAndrej Karpathy 的 GitHub 技能樹:一份重新定義 AI 可信度的趣味履歷The GitHub repository 'vtroiswhite/andrej-karpathy-skills' has captured the AI community's imagination by presenting AndHotkey Helper:終於解決插件配置混亂的 Obsidian 插件Obsidian's extensibility is its greatest strength, but also its Achilles' heel. As users accumulate plugins for tasks liOpen source hub1709 indexed articles from GitHub

Archive

May 20261237 published articles

Further Reading

Stash:開源記憶層,終於讓AI代理具備持久化能力Stash 是由 alash3al 推出的全新開源專案,透過 Postgres 與內建的 MCP 伺服器,為 AI 代理提供持久化的記憶層。它採用單一二進位檔、可自行託管的設計,無需依賴雲端服務,從根本上解決了代理狀態管理的難題。Mobile-MCP 橋接 AI 智能體與智慧型手機,開啟自主行動互動一個名為 mobile-next/mobile-mcp 的新開源專案,正在打破 AI 智能體的一個根本障礙:智慧型手機螢幕。透過為行動裝置實作模型情境協定,它為大型語言模型提供了一個標準化管道,使其能直接感知並操控 iOS 和 Androi深入AI黑盒:系統提示如何塑造AI開發的未來一個包含頂級AI工具逆向工程系統提示的龐大GitHub倉庫,已在AI開發領域引發了一場靜默革命。名為x1xhlol/system-prompts的倉庫擁有超過133,000顆星,前所未有地揭示了驅動Cursor、Devin AI等工具的隱藏bb-browser 如何將你的瀏覽器變成 AI 代理的手和眼開源專案 bb-browser 正在引領 AI 代理與網路互動方式的根本性變革。它將一個帶有用戶已驗證會話的即時 Chrome 實例轉化為可控的 API,從而解決了代理式 AI 中最棘手的挑戰之一:在複雜、有狀態的網路環境中進行操作。

常见问题

GitHub 热点“AI-Powered Protocol Analysis: How Anything Analyzer Rewrites Reverse Engineering”主要讲了什么?

The anything-analyzer project, hosted on GitHub under mouseww/anything-analyzer, has rapidly gained 2,417 stars with a daily spike of +788, signaling intense interest from develope…

这个 GitHub 项目在“anything-analyzer vs Burp Suite for API reverse engineering”上为什么会引发关注?

Anything-analyzer is not a single monolithic tool but a pipeline of interconnected modules orchestrated by a Node.js runtime. The core architecture consists of five layers: 1. Browser Capture Layer: Uses Puppeteer or Pla…

从“how to use anything-analyzer with Cursor IDE MCP integration”看,这个 GitHub 项目的热度表现如何?

当前相关 GitHub 项目总星标约为 2417,近一日增长约为 788,这说明它在开源社区具有较强讨论度和扩散能力。