Control HTTP Toolkit for intercepting, inspecting, and debugging HTTP traffic.
httptoolkit-mcp
A Model Context Protocol (MCP) server that provides AI assistants with full control over HTTP Toolkit — the powerful, open-source HTTP(S) debugging proxy.
Intercept, inspect, and debug HTTP traffic from browsers, Android/iOS devices, Docker containers, JVM processes, and more — all through natural language via your AI assistant.
Features
- Live Traffic Capture — Capture intercepted HTTP traffic in real-time with full request/response headers and bodies
- Browser Interception — Launch Chrome or Firefox with traffic automatically routed through the proxy
- Android Interception — Intercept device traffic via ADB or target specific apps with Frida (bypasses certificate pinning)
- iOS Interception — Intercept specific iOS apps via Frida on jailbroken devices
- Docker Interception — Attach to running Docker containers and capture all outgoing HTTP traffic
- Terminal Interception — Open intercepted terminal sessions or configure existing ones
- JVM Attach — Attach to running Java/Kotlin/Clojure processes
- Electron Apps — Launch Electron applications with interception enabled
- HTTP Client — Send HTTP requests through the proxy with full control over method, headers, and body
- Server Management — Query configuration, manage interceptors, and control the server lifecycle
- Zero-Config with Desktop App — Automatically detects auth token from the running HTTP Toolkit desktop app
Prerequisites
- HTTP Toolkit installed and running (desktop app or server)
- Node.js >= 18
Installation
Using npx (recommended)
No installation required — just configure your MCP client:
{
"mcpServers": {
"httptoolkit": {
"command": "npx",
"args": ["-y", "httptoolkit-mcp"]
}
}
}
Global install
npm install -g httptoolkit-mcp
From source
git clone https://github.com/fdciabdul/httptoolkit-mcp.git
cd httptoolkit-mcp
npm install
npm run build
Configuration
Claude Code
Add to ~/.claude/settings.json or ~/.claude.json:
{
"mcpServers": {
"httptoolkit": {
"command": "npx",
"args": ["-y", "httptoolkit-mcp"]
}
}
}
Claude Desktop
Add to your claude_desktop_config.json:
{
"mcpServers": {
"httptoolkit": {
"command": "npx",
"args": ["-y", "httptoolkit-mcp"]
}
}
}
Environment Variables
| Variable | Description | Default |
|---|---|---|
HTK_SERVER_URL |
HTTP Toolkit management API URL | http://127.0.0.1:45457 |
HTK_SERVER_TOKEN |
Auth token (auto-detected from desktop app) | Auto-detected |
HTK_ADMIN_URL |
Mockttp admin API URL | http://127.0.0.1:45456 |
Note: When using the HTTP Toolkit desktop app, the auth token is automatically detected from the running process — no manual configuration needed.
Example with manual environment variables:
{
"mcpServers": {
"httptoolkit": {
"command": "npx",
"args": ["-y", "httptoolkit-mcp"],
"env": {
"HTK_SERVER_URL": "http://127.0.0.1:45457",
"HTK_SERVER_TOKEN": "your-token-here"
}
}
}
}
Available Tools
Traffic Capture
| Tool | Description |
|---|---|
capture_traffic |
Capture live intercepted HTTP traffic with full request/response bodies. Subscribes to the active HTTP Toolkit session via WebSocket. Supports auto-detection or manual session ID. |
Server Management
| Tool | Description |
|---|---|
get_version |
Get the HTTP Toolkit server version |
get_config |
Get proxy configuration (certificates, DNS, system proxy) |
get_network_interfaces |
List all network interfaces |
trigger_update |
Trigger a server update check |
shutdown_server |
Shutdown the HTTP Toolkit server |
Interceptor Management
| Tool | Description |
|---|---|
list_interceptors |
List all available interceptors and their status |
get_interceptor_metadata |
Get detailed metadata for a specific interceptor |
activate_interceptor |
Generic interceptor activation with custom options |
deactivate_interceptor |
Deactivate a running interceptor |
Browser Interception
| Tool | Description |
|---|---|
intercept_chrome |
Launch a fresh Chrome window with interception |
intercept_firefox |
Launch a fresh Firefox window with interception |
Terminal Interception
| Tool | Description |
|---|---|
intercept_fresh_terminal |
Open a new terminal with interception enabled |
intercept_existing_terminal |
Get commands to enable interception in an existing terminal |
Docker Interception
| Tool | Description |
|---|---|
intercept_docker_container |
Attach to a running Docker container |
Android Interception
| Tool | Description | |------
Tools (15)
capture_trafficCapture live intercepted HTTP traffic with full request/response bodies.get_versionGet the HTTP Toolkit server version.get_configGet proxy configuration including certificates, DNS, and system proxy.get_network_interfacesList all network interfaces.trigger_updateTrigger a server update check.shutdown_serverShutdown the HTTP Toolkit server.list_interceptorsList all available interceptors and their status.get_interceptor_metadataGet detailed metadata for a specific interceptor.activate_interceptorGeneric interceptor activation with custom options.deactivate_interceptorDeactivate a running interceptor.intercept_chromeLaunch a fresh Chrome window with interception.intercept_firefoxLaunch a fresh Firefox window with interception.intercept_fresh_terminalOpen a new terminal with interception enabled.intercept_existing_terminalGet commands to enable interception in an existing terminal.intercept_docker_containerAttach to a running Docker container.Environment Variables
HTK_SERVER_URLHTTP Toolkit management API URLHTK_SERVER_TOKENAuth token (auto-detected from desktop app)HTK_ADMIN_URLMockttp admin API URLConfiguration
{"mcpServers": {"httptoolkit": {"command": "npx", "args": ["-y", "httptoolkit-mcp"]}}}