HTTP Toolkit MCP Server

1

Add it to Claude Code

Run this in a terminal.

Run in terminal
claude mcp add http-toolkit -- npx -y httptoolkit-mcp
README.md

Control HTTP Toolkit for intercepting, inspecting, and debugging HTTP traffic.

httptoolkit-mcp

A Model Context Protocol (MCP) server that provides AI assistants with full control over HTTP Toolkit — the powerful, open-source HTTP(S) debugging proxy.

Intercept, inspect, and debug HTTP traffic from browsers, Android/iOS devices, Docker containers, JVM processes, and more — all through natural language via your AI assistant.

Features

  • Live Traffic Capture — Capture intercepted HTTP traffic in real-time with full request/response headers and bodies
  • Browser Interception — Launch Chrome or Firefox with traffic automatically routed through the proxy
  • Android Interception — Intercept device traffic via ADB or target specific apps with Frida (bypasses certificate pinning)
  • iOS Interception — Intercept specific iOS apps via Frida on jailbroken devices
  • Docker Interception — Attach to running Docker containers and capture all outgoing HTTP traffic
  • Terminal Interception — Open intercepted terminal sessions or configure existing ones
  • JVM Attach — Attach to running Java/Kotlin/Clojure processes
  • Electron Apps — Launch Electron applications with interception enabled
  • HTTP Client — Send HTTP requests through the proxy with full control over method, headers, and body
  • Server Management — Query configuration, manage interceptors, and control the server lifecycle
  • Zero-Config with Desktop App — Automatically detects auth token from the running HTTP Toolkit desktop app

Prerequisites

  • HTTP Toolkit installed and running (desktop app or server)
  • Node.js >= 18

Installation

Using npx (recommended)

No installation required — just configure your MCP client:

{
  "mcpServers": {
    "httptoolkit": {
      "command": "npx",
      "args": ["-y", "httptoolkit-mcp"]
    }
  }
}

Global install

npm install -g httptoolkit-mcp

From source

git clone https://github.com/fdciabdul/httptoolkit-mcp.git
cd httptoolkit-mcp
npm install
npm run build

Configuration

Claude Code

Add to ~/.claude/settings.json or ~/.claude.json:

{
  "mcpServers": {
    "httptoolkit": {
      "command": "npx",
      "args": ["-y", "httptoolkit-mcp"]
    }
  }
}

Claude Desktop

Add to your claude_desktop_config.json:

{
  "mcpServers": {
    "httptoolkit": {
      "command": "npx",
      "args": ["-y", "httptoolkit-mcp"]
    }
  }
}

Environment Variables

Variable Description Default
HTK_SERVER_URL HTTP Toolkit management API URL http://127.0.0.1:45457
HTK_SERVER_TOKEN Auth token (auto-detected from desktop app) Auto-detected
HTK_ADMIN_URL Mockttp admin API URL http://127.0.0.1:45456

Note: When using the HTTP Toolkit desktop app, the auth token is automatically detected from the running process — no manual configuration needed.

Example with manual environment variables:

{
  "mcpServers": {
    "httptoolkit": {
      "command": "npx",
      "args": ["-y", "httptoolkit-mcp"],
      "env": {
        "HTK_SERVER_URL": "http://127.0.0.1:45457",
        "HTK_SERVER_TOKEN": "your-token-here"
      }
    }
  }
}

Available Tools

Traffic Capture

Tool Description
capture_traffic Capture live intercepted HTTP traffic with full request/response bodies. Subscribes to the active HTTP Toolkit session via WebSocket. Supports auto-detection or manual session ID.

Server Management

Tool Description
get_version Get the HTTP Toolkit server version
get_config Get proxy configuration (certificates, DNS, system proxy)
get_network_interfaces List all network interfaces
trigger_update Trigger a server update check
shutdown_server Shutdown the HTTP Toolkit server

Interceptor Management

Tool Description
list_interceptors List all available interceptors and their status
get_interceptor_metadata Get detailed metadata for a specific interceptor
activate_interceptor Generic interceptor activation with custom options
deactivate_interceptor Deactivate a running interceptor

Browser Interception

Tool Description
intercept_chrome Launch a fresh Chrome window with interception
intercept_firefox Launch a fresh Firefox window with interception

Terminal Interception

Tool Description
intercept_fresh_terminal Open a new terminal with interception enabled
intercept_existing_terminal Get commands to enable interception in an existing terminal

Docker Interception

Tool Description
intercept_docker_container Attach to a running Docker container

Android Interception

| Tool | Description | |------

Tools (15)

capture_trafficCapture live intercepted HTTP traffic with full request/response bodies.
get_versionGet the HTTP Toolkit server version.
get_configGet proxy configuration including certificates, DNS, and system proxy.
get_network_interfacesList all network interfaces.
trigger_updateTrigger a server update check.
shutdown_serverShutdown the HTTP Toolkit server.
list_interceptorsList all available interceptors and their status.
get_interceptor_metadataGet detailed metadata for a specific interceptor.
activate_interceptorGeneric interceptor activation with custom options.
deactivate_interceptorDeactivate a running interceptor.
intercept_chromeLaunch a fresh Chrome window with interception.
intercept_firefoxLaunch a fresh Firefox window with interception.
intercept_fresh_terminalOpen a new terminal with interception enabled.
intercept_existing_terminalGet commands to enable interception in an existing terminal.
intercept_docker_containerAttach to a running Docker container.

Environment Variables

HTK_SERVER_URLHTTP Toolkit management API URL
HTK_SERVER_TOKENAuth token (auto-detected from desktop app)
HTK_ADMIN_URLMockttp admin API URL

Configuration

claude_desktop_config.json
{"mcpServers": {"httptoolkit": {"command": "npx", "args": ["-y", "httptoolkit-mcp"]}}}

Try it

Launch a new Chrome window with traffic interception enabled.
List all currently running interceptors and their status.
Attach to my running Docker container to capture its outgoing HTTP traffic.
Get the current proxy configuration and network interfaces.
Capture live HTTP traffic and show me the request headers.

Frequently Asked Questions

What are the key features of HTTP Toolkit?

Live traffic capture with full request/response headers and bodies. Automated browser interception for Chrome and Firefox. Docker container traffic inspection. Terminal session interception. Automatic auth token detection from HTTP Toolkit desktop app.

What can I use HTTP Toolkit for?

Debugging API calls made by a web application during development. Inspecting network traffic from a Docker container to troubleshoot connectivity. Analyzing HTTP requests in a terminal-based CLI tool. Bypassing certificate pinning for mobile app traffic analysis.

How do I install HTTP Toolkit?

Install HTTP Toolkit by running: npx -y httptoolkit-mcp

What MCP clients work with HTTP Toolkit?

HTTP Toolkit works with any MCP-compatible client including Claude Desktop, Claude Code, Cursor, and other editors with MCP support.

Turn this server into reusable context

Keep HTTP Toolkit docs, env vars, and workflow notes in Conare so your agent carries them across sessions.

Need the old visual installer? Open Conare IDE.
Open Conare