MITM proxy manager with MCP integration
Project description
mitmproxy MCP Server
A Model Context Protocol (MCP) server that transforms mitmproxy into a powerful toolset for AI agents. This allows LLMs (like Claude, GPT-4, or local models) to inspect, modify, and replay HTTP/HTTPS traffic in real-time.
New in this build (the fun stuff)
This project has grown beyond simple capture + replay. You can now:
- Search traffic quickly with filters by domain/method/body text.
- Extract data from responses using JSONPath or CSS selectors.
- Use session variables to grab tokens from one response and reuse them in later replays.
- Run lightweight fuzzing against query params or JSON body fields for quick DAST checks.
- Reconstruct API patterns and export an OpenAPI-style spec from captured traffic.
- Detect auth patterns (Bearer/JWT/API key/session cookie/CSRF/OAuth hints).
- Generate starter scraper code from real captured flows.
Why use this?
Standard "web search" or "fetch" tools are stateless and easily detected. mitmproxy-mcp provides:
- Deep Debugging: The agent can inspect full request/response cycles (headers, payloads, cookies) to identify why a frontend is failing or why an API is returning a
4xx/500error. - API Reverse Engineering: Let the LLM observe undocumented internal APIs, map out JSON schemas, and generate client libraries or documentation automatically.
- Automated Security Testing: Perform DAST (Dynamic Application Security Testing) by allowing the agent to inject payloads into specific parameters and analyze the response.
- Live Interception: Modify traffic on the fly: inject headers, mock responses for testing, or block tracking pixels to reduce noise.
- Stealth Replay: Uses
curl-cffito mimic Chrome/Safari TLS fingerprints, bypassing basic anti-bot measures that standard Python libraries trigger.
Key Features
- Lifecycle Control: Start and stop the mitmproxy instance directly from the LLM.
- Deep Inspection: Capture full request/response cycles, including headers, bodies, and timing.
- Traffic Search & Filtering: Scope by domain, then search flows by query/method so context stays clean.
- Active Interception: Dynamic rules to inject headers, replace body content via regex, or block requests.
- Stealth Replay: Re-execute flows using
curl-cffito impersonate modern browser TLS fingerprints (e.g., Chrome). - Session-Aware Workflows: Extract dynamic values (like CSRF tokens) and re-inject them into replayed traffic.
- Response Data Extraction: Pull structured values from HTML/JSON responses via CSS selectors and JSONPath.
- API Discovery: Group similar endpoints, identify path/query params, and export OpenAPI JSON.
- Security Recon Helpers: Detect common auth patterns and run targeted fuzz payloads.
- Scraper Bootstrapping: Generate executable
curl-cffiautomation code from observed traffic.
Quickstart
Option 1: Using uvx (Recommended)
Add this to your MCP client configuration (e.g., Claude Desktop, Cursor, or AntiGravity):
{
"mcpServers": {
"mitmproxy-mcp": {
"command": "uvx",
"args": ["mitmproxy-mcp"]
}
}
}
Option 2: From a Cloned Repository
If you want to run from a local clone (useful for development or testing unreleased changes):
git clone https://github.com/snapspecter/mitmproxy-mcp.git
Then add this to your MCP client configuration, replacing the path with your clone location:
{
"mcpServers": {
"mitmproxy-mcp": {
"type": "stdio",
"command": "uv",
"args": ["run", "--directory", "/path/to/mitmproxy-mcp", "mitmproxy-mcp"]
}
}
}
Installation
Option 1: Global Install (with uv)
uv tool install mitmproxy-mcp
Option 2: Docker (Isolated Environment)
# Build and run
docker build -t mitmproxy-mcp .
docker run -p 8080:8080 mitmproxy-mcp
Option 3: Manual Pip Install
python -m venv venv
source venv/bin/activate
pip install mitmproxy-mcp
Available Tools
Lifecycle & Configuration
start_proxy(port=8080): Starts the mitmproxy server.stop_proxy(): Shuts down the proxy.set_scope(allowed_domains): Filters recorded traffic (e.g.,["api.github.com", "example.com"]).list_tools(): Returns all exposed MCP tools and input schemas.
Inspection
get_traffic_summary(limit=20): Returns a list of recent network flows.inspect_flow(flow_id): Provides full details and acurlequivalent for a specific flow.search_traffic(query, domain, method, limit=50): Filter captured traffic by keyword/domain/method.clear_traffic(): Clears persisted traffic history.
Modification & Interception
add_interception_rule(rule_id, action_type, ...):action_type:inject_header,replace_body, orblock.phase:requestorresponse.set_global_header(key, value): Injects a header into every request.remove_global_header(key): Removes a previously injected global header.list_rules(): Shows currently active interception rules.clear_rules(): Flushes all active interception rules.
Replay
replay_flow(flow_id, method, headers_json, body): Re-sends a request with modifications using browser-grade impersonation.
Extraction & Session Variables
extract_from_flow(flow_id, json_path=None, css_selector=None): Extract values from captured response bodies.set_session_variable(name, value): Manually set a session variable.extract_session_variable(name, flow_id, regex_pattern, group_index=1): Extract and save a variable from a response body.
Security & API Analysis
fuzz_endpoint(flow_id, target_param, param_type, payload_category, timeout=10.0): Replay with payload substitutions and report anomalies.get_api_patterns(domain=None, limit=50): Cluster captured traffic into endpoint patterns.export_openapi_spec(domain=None, limit=50): Produce an OpenAPI v3 JSON spec from captured traffic.detect_auth_pattern(flow_ids=None): Infer likely auth mechanisms from observed requests.
Code Generation
generate_scraper_code(flow_ids, target_framework="curl_cffi"): Generate starter scraper/automation code from captured flows.
Programmatic Usage
Note: These are JSON-RPC calls sent by the MCP Host (Client). You do not need to type these manually in the terminal.
- Initialize the Proxy:
{"method": "tools/call", "params": {"name": "start_proxy", "arguments": {"port": 8080}}} - Intercept & Block:
{"method": "tools/call", "params": {"name": "add_interception_rule", "arguments": {"rule_id": "block-ads", "action_type": "block", "url_pattern": ".*analytics.*"}}} - Modify Response:
{"method": "tools/call", "params": {"name": "add_interception_rule", "arguments": {"rule_id": "mock-api", "action_type": "replace_body", "url_pattern": ".*user/profile.*", "action_value": "{\"name\": \"AI Agent\"}"}}}
Helpful Tips
- Manage Context: Use
set_scopeimmediately. LLMs perform poorly when flooded with background OS telemetry. - Browser Setup: Ensure your browser or application is configured to use the proxy (usually
localhost:8080) and has the mitmproxy CA certificates installed for HTTPS inspection. - Stealth: The
replay_flowtool usescurl-cffispecifically to avoid being flagged as a bot by services that check TLS fingerprints.
Development
git clone [https://github.com/snapspecter/mitmproxy-mcp.git](https://github.com/snapspecter/mitmproxy-mcp.git)
cd mitmproxy-mcp
uv sync
uv run pytest
License: MIT
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file mitmproxy_mcp-0.5.3.tar.gz.
File metadata
- Download URL: mitmproxy_mcp-0.5.3.tar.gz
- Upload date:
- Size: 29.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
82f0f83dac7d7d4f6067fa6c77040a0bab11165fc40935d6812a2001fe5e0daf
|
|
| MD5 |
ce04ecf810abfb4598c6ae6f6ab6dd58
|
|
| BLAKE2b-256 |
5e072c303917d3576560079c4a866669c92508fbc61ec10a1b25778b066fcef3
|
File details
Details for the file mitmproxy_mcp-0.5.3-py3-none-any.whl.
File metadata
- Download URL: mitmproxy_mcp-0.5.3-py3-none-any.whl
- Upload date:
- Size: 25.6 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
2c125ac5d1ff7929f6bd9fb5a5aff9e245b43d5d7d81dcd91c441c777cdf1e20
|
|
| MD5 |
8437362892e715cfb1f6b05bfacd4a41
|
|
| BLAKE2b-256 |
c9be108fe5c97e7d12684393f59a43ffc3c6c3e6fc22d1abc13a0d876d89b4f5
|