Skip to content

Conversation

@BestYifu
Copy link
Contributor

Add Foxit's PDFActionInspector MCP server to the official integrations list

PDFActionInspector provides JavaScript Actions extraction and security analysis for PDF files, enabling AI-assisted detection of malicious PDF behaviors and potential security threats.

Description

This PR adds the PDFActionInspector MCP server to the official integrations list. PDFActionInspector is a specialized security analysis tool that extracts and analyzes JavaScript Actions embedded in PDF files, helping security professionals and researchers identify potentially malicious PDF behaviors.

Server Details

Motivation and Context

PDF files can contain JavaScript Actions that execute automatically when documents are opened or interacted with. These Actions can be used for legitimate purposes but are also commonly exploited for:

  • Malicious URL redirection
  • Data exfiltration
  • Hidden field manipulation (e.g., price changes in contracts)
  • Multi-stage attacks

PDFActionInspector addresses the need for AI-assisted security analysis of PDF Actions by:

  1. Extracting Actions from all PDF levels (document, page, annotation, field)
  2. Providing structured data for AI analysis
  3. Supporting encrypted PDF analysis
  4. Offering comprehensive security assessment prompts

How Has This Been Tested?

Tested with Claude Desktop and GitHub Copilot:

  • Malicious JavaScript detection (obfuscated code analysis)
  • Financial document manipulation detection (signature field price changes)
  • Clean document verification (ISO specification documents)
  • Encrypted PDF analysis with password handling

Cross-platform compatibility:

  • Windows (native development)
  • macOS (universal wheel package)
  • Linux (universal wheel package)

Integration scenarios:

  • Claude Desktop MCP configuration
  • VS Code with GitHub Copilot
  • Command-line usage for security workflows

Breaking Changes

None. This is a new server addition that doesn't affect existing MCP configurations.

Types of changes

  • New feature (non-breaking change which adds functionality)
  • Bug fix (non-breaking change which fixes an issue)
  • Breaking change (fix or feature that would cause existing functionality to change)
  • Documentation update

Checklist

  • I have read the MCP Protocol Documentation
  • My changes follows MCP security best practices
  • I have updated the server's README accordingly
  • I have tested this with an LLM client
  • My code follows the repository's style guidelines
  • New and existing tests pass locally
  • I have added appropriate error handling
  • I have documented all environment variables and configuration options

Additional context

Installation:

pip install pdf-action-inspector

Configuration:

{
  "mcpServers": {
    "pdf-action-inspector": {
      "command": "uv",
      "args": ["run", "pdf-action-inspector"]
    }
  }
}

Key Features:

  • 15+ specialized PDF analysis tools
  • Security-focused Action extraction
  • AI-optimized analysis prompts
  • Comprehensive caching system
  • Password-protected PDF support

Use Cases:

  • Security research and malware analysis
  • Document integrity verification
  • Automated PDF threat detection
  • Financial document security auditing

Company: Foxit Software Inc. - Leading PDF technology company with 20+ years of PDF expertise.

Add Foxit's PDFActionInspector MCP server to the official integrations list.
PDFActionInspector provides JavaScript Actions extraction and security
analysis for PDF files, enabling AI-assisted detection of malicious
PDF behaviors and potential security threats.
@olaservo olaservo merged commit 6655041 into modelcontextprotocol:main Sep 3, 2025
19 checks passed
@BestYifu BestYifu deleted the feature/pdf-action-inspector branch September 3, 2025 06:16
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants