Agent Droid Bridge is an MCP server that connects AI agents to Android devices and emulators over ADB, facilitating mobile automation, app testing, dynamic analysis, and reverse engineering.
From the registry: MCP server giving AI agents eyes and hands inside Android devices via ADB

$ curl -LsSf https://astral.sh/uv/install.sh | shhttps://docs.astral.sh/uv/Please install the `agent-droid-bridge` MCP server into my current AI client (that's you).
Required prerequisites (do these first if not already done):
- **Python 3.11+** — Required runtime (https://www.python.org/)
- **uv (uvx)** — Install uv which provides uvx Run: `curl -LsSf https://astral.sh/uv/install.sh | sh` (https://docs.astral.sh/uv/)
- **ADB (Android Debug Bridge)** — Install ADB on your host and have an Android device/emulator connected
Canonical MCP server config (stdio transport):
- command: `uvx`
- args: ["agent-droid-bridge"]
- optional environment variables:
- `ADB_EXECUTION_MODE`: unrestricted (default) or restricted (example: `unrestricted`)
- `ADB_ALLOW_SHELL`: Set to false to block all adb shell commands (example: `true`)
- `MCP_LOG_ENABLED`: Enable session logging (example: `false`)
- `MCP_LOG_DIR`: Log output directory (example: `~/logs/agent-droid-bridge`)
Add this MCP server to my current client's config in the correct format for you. If you need secrets or credentials I haven't provided, ASK me — do not invent values or leave raw placeholders. After adding it, tell me how to verify the server is connected.ADB_EXECUTION_MODErequiredSets the execution mode for ADB commandsADB_ALLOW_SHELLrequiredBlocks all adb shell commands entirely if set to falseManage UniFi Network devices, clients, firewall, VLANs, VPNs, and more via MCP.