@sambowne For example, I can set up a chat app, point it to an LLM, then hook up an mcp server. Say, I use a binary ninja mcp server. Then I can load a binary into binary ninja, and ask the llm to analyze it. Rename functions. Look for vulnerabilities. Write a proof of concept exploit.