MCP
Explain how to use MCP on Proxyman with Cursor or Claude Code
1. What is Proxyman MCP?
Proxyman MCP (Model Context Protocol) is a feature that enables AI assistants (Claude, Cursor, and other MCP-compatible tools) to directly interact with the Proxyman macOS app. It allows AI to inspect HTTP traffic, create debugging rules, and control Proxyman - all through natural language conversations.
The architecture consists of two components:
MCP HTTP Server - Runs inside Proxyman app on localhost with token-based authentication
MCP CLI Server - A stdio-based MCP server that AI tools connect to, which forwards commands to Proxyman
2. Benefits
AI-Powered Debugging
Ask AI to analyze captured traffic, find specific requests, or explain API responses
Hands-Free Rule Creation
Create breakpoints, map local/remote rules through conversation
Faster Workflow
Export cURL commands, filter flows, and manage sessions without switching context
Secure by Design
Localhost-only server with per-session token authentication
IDE Integration
Works seamlessly with Cursor and other MCP-compatible tools
3. How to Use
Setup
Enable MCP in Proxyman
Open Proxyman → Settings → MCP
Toggle Enable MCP Server
Configure your MCP client (e.g., Cursor, Claude Desktop)
Add to your MCP configuration:
{ "mcpServers": { "proxyman": { "command": "/Applications/Proxyman.app/Contents/MacOS/proxyman-mcp-server" } } }Start using
Ensure Proxyman is running
Ask your AI assistant to interact with Proxyman
Example Prompts
4. Available Tools
Read-Only Tools
get_version
Returns Proxyman version and build number
get_proxy_status
Returns recording state, proxy port, and SSL proxying status
get_flows
Lists captured HTTP/HTTPS flows with optional filters (limit, host_filter, method_filter, status_filter)
get_flow_detail
Returns full details of a specific flow including headers, body preview, query params, and cookies
list_rules
Lists all debugging rules (breakpoints, map local, map remote, blacklist)
get_ssl_proxying_list
Returns SSL proxying include/exclude domain lists
get_certificate_status
Returns root certificate installation status
Write Tools
create_breakpoint
Creates a breakpoint to pause/inspect matching requests
url (pattern)
create_map_local
Returns custom responses for matching URLs
url (pattern)
create_map_remote
Redirects requests from one URL to another
from_url, to_url
create_blacklist
Blocks requests matching a URL pattern
url (pattern)
enable_ssl_proxying
Enables HTTPS decryption for a domain
domain
Session Control
clear_session
Clears all captured flows from current session
toggle_recording
Starts or stops traffic recording
Flow Operations
export_flow_curl
Exports a captured request as a runnable cURL command
filter_flows
Advanced filtering with multiple criteria (url, host, method, status, headers, body) supporting AND/OR combinations
App Control
open_proxyman
Launches Proxyman if not running
quit_proxyman
Quits the Proxyman app
Security
Server binds to
127.0.0.1only (no network exposure)Per-session cryptographic token stored in
~/Library/Application Support/com.proxyman.NSProxy/mcp-handshake.jsonHandshake file has
0600permissions (owner-only access)Sensitive data (auth tokens, passwords, API keys) is automatically redacted in responses
Last updated