Skip to main content

CLI tool to manage proxy shadow keys

Project description

Proxy Shadow Keys

A CLI tool and local proxy service designed to intercept network requests and transparently replace "shadow keys" (e.g., shadow_my_api_key) with your real, secret keys stored securely in the macOS Keychain.

This tool allows developers to use placeholder keys in their application code or environment files, preventing accidental exposure or commits of sensitive API keys to version control.

Intentions

  • Security Details: Never hardcode real API keys in your .env files, scripts, or repositories.
  • Convenience: Use consistent placeholder keys (like shadow_stripe_secret) across your projects and let the proxy handle inserting the real sensitive values behind the scenes.
  • Fallbacks: If a shadow key isn't found in your secure vault, the proxy sends the original placeholder unchanged, preventing unexpected crashes and making debugging easy.

Project Structure

proxy-shadow-keys/
├── src/
│   └── proxy_shadow_keys/
│       ├── cli.py            # Click-based CLI commands (set, rm, start, stop, install-cert)
│       ├── interceptor.py    # mitmproxy addon that intercepts and replaces shadow keys
│       └── system_proxy.py   # Cross-platform utility to toggle system proxy settings (Windows, macOS, Linux)
├── tests/
│   ├── features/             # Behavior-Driven Development (BDD) feature specifications
│   └── step_defs/            # pytest-bdd step definitions
└── pyproject.toml            # Project configuration and dependencies

How It Works

  1. Store Keys: Use the CLI to store a real key mapping in your system's keyring (macOS Keychain, Windows Credential Locker, or Linux Secret Service).
  2. Start Proxy: The CLI starts a local mitmproxy instance in the background and configures your OS system proxy (macOS networksetup, Windows Registry, or Linux gsettings) to route traffic through it.
  3. Intercept & Replace: As your system makes HTTP/HTTPS requests, the mitmproxy addon parses request headers, JSON bodies, and URL query parameters. When it detects a string starting with shadow_, it queries the local keyring to swap the placeholder with the real API key before forwarding the request to its destination.

Requirements

  • macOS, Windows, or Linux (GNOME)
  • Python 3.9+
  • mitmproxy installed and available

Installation

The recommended way to install and run the CLI globally in an isolated environment is using pipx or uv:

# Using uv (fastest)
uv tool install proxy-shadow-keys

# Or using pipx
pipx install proxy-shadow-keys

Standard Installation

You can install proxy-shadow-keys via pip:

pip install proxy-shadow-keys

Recommended: Using pipx

For CLI tools, it's recommended to use pipx to keep dependencies isolated:

pipx install proxy-shadow-keys

One-liner (curl)

If you have pip installed, you can use this one-liner to download and install the latest version directly:

curl -sSL https://raw.githubusercontent.com/Tavernari/proxy-shadow-keys/main/scripts/install.sh | bash

Development or Source Installation

If you want to contribute or use the latest unreleased changes:

# Clone the repository
git clone git@github.com:Tavernari/proxy-shadow-keys.git
cd proxy-shadow-keys

# Install in editable mode
pip install -e .

Usage

1. Certificate Installation

For the proxy to inspect encrypted HTTPS traffic, you must first install and trust the mitmproxy CA certificate. Run this command once (requires sudo privileges):

proxy-shadow-keys install-cert

2. Managing Shadow Keys

Map a placeholder shadow_ key to your real API key (stored securely via keyring):

proxy-shadow-keys set shadow_openai_key sk-proj-123456789...

To remove a mapped key:

proxy-shadow-keys rm shadow_openai_key

3. Proxy Lifecycle

Start the proxy. This will launch mitmproxy in the background and configure your local network settings to use the local proxy:

proxy-shadow-keys start

(Default port is 8080. You can optionally pass --port 8081)

When you're done, stop the proxy to restore your standard network settings:

proxy-shadow-keys stop

Testing

The project uses a BDD approach with pytest and pytest-bdd. All functionality is strictly defined in feature files before implementation.

# Install development dependencies
pip install -e ".[dev]"

# Run all tests
pytest

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

proxy_shadow_keys-0.1.5.tar.gz (11.9 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

proxy_shadow_keys-0.1.5-py3-none-any.whl (9.3 kB view details)

Uploaded Python 3

File details

Details for the file proxy_shadow_keys-0.1.5.tar.gz.

File metadata

  • Download URL: proxy_shadow_keys-0.1.5.tar.gz
  • Upload date:
  • Size: 11.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for proxy_shadow_keys-0.1.5.tar.gz
Algorithm Hash digest
SHA256 69b2736def9e5cb52a4dcf930a92a58a2d25f6cd2d359b7a89cbd6c58558652a
MD5 fa0c0a2bae7bdfd4fc5a8dc7b3eb67ea
BLAKE2b-256 4ce5ecb8fddd0f930c066630fd458e3062efb5d479e6e1a321b8af8d337399ba

See more details on using hashes here.

Provenance

The following attestation bundles were made for proxy_shadow_keys-0.1.5.tar.gz:

Publisher: release.yml on Tavernari/proxy-shadow-keys

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file proxy_shadow_keys-0.1.5-py3-none-any.whl.

File metadata

File hashes

Hashes for proxy_shadow_keys-0.1.5-py3-none-any.whl
Algorithm Hash digest
SHA256 78aae47ede66b433c6e28c9e6aff366af66efa363e0eea77ddfdbe6df6cc71e5
MD5 8bbbdd75c48623345315f95e221c3856
BLAKE2b-256 6cc24b9eec7f5cb3790583fcaedd727dd3571566a18ec18172dfc9f6e6f52b92

See more details on using hashes here.

Provenance

The following attestation bundles were made for proxy_shadow_keys-0.1.5-py3-none-any.whl:

Publisher: release.yml on Tavernari/proxy-shadow-keys

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page