Server Configuration
Describes the environment variables required to run the server.
| Name | Required | Description | Default |
|---|---|---|---|
| HTK_SERVER_URL | No | HTTP Toolkit server URL | http://127.0.0.1:45457 |
| HTK_SERVER_TOKEN | No | Authentication token (if server requires one) |
Capabilities
Features and capabilities supported by this server
| Capability | Details |
|---|---|
| tools | {
"listChanged": true
} |
Tools
Functions exposed to the LLM to take actions
| Name | Description |
|---|---|
| get_version | Get the current HTTP Toolkit server version |
| get_config | Get HTTP Toolkit proxy configuration including certificate paths, network interfaces, system proxy, and DNS servers |
| get_network_interfaces | List all network interfaces on the system |
| trigger_update | Trigger an update check for the HTTP Toolkit server |
| shutdown_server | Shutdown the HTTP Toolkit server. WARNING: This will stop all interception. |
| list_interceptors | List all available HTTP traffic interceptors (browsers, terminals, mobile devices, Docker, etc.) and their activation status |
| get_interceptor_metadata | Get detailed metadata for a specific interceptor. Returns available targets like Docker containers, Android devices, JVM processes, etc. |
| deactivate_interceptor | Deactivate a running interceptor and stop capturing its traffic |
| intercept_chrome | Launch a fresh independent Chrome window with all HTTP(S) traffic intercepted. The browser uses an isolated profile so it won't affect your normal browsing. |
| intercept_firefox | Launch a fresh independent Firefox window with all HTTP(S) traffic intercepted. Uses an isolated profile. |
| intercept_fresh_terminal | Open a new terminal window where all launched processes and Docker containers will have their HTTP(S) traffic intercepted automatically. |
| intercept_existing_terminal | Get a command to run in an existing terminal to start intercepting HTTP(S) traffic from processes launched in that terminal. Returns shell-specific commands for bash, zsh, fish, etc. |
| intercept_docker_container | Intercept all HTTP(S) traffic from a running Docker container. Injects proxy settings into the container to capture all outgoing HTTP traffic. |
| intercept_android_adb | Intercept HTTP(S) traffic from an Android device or emulator connected via ADB. Automatically injects system HTTPS certificates into rooted devices and most emulators. |
| frida_android_setup | Set up a Frida host on an Android device connected via ADB. This prepares the device for app-level interception by installing the Frida server and CA certificate. |
| frida_android_launch | Launch the Frida server on an Android device. Must run frida_android_setup first. |
| frida_android_intercept | Intercept a specific Android app using Frida dynamic instrumentation. Automatically disables most certificate pinning. Requires a rooted device with Frida server running (use frida_android_setup and frida_android_launch first). |
| frida_ios_intercept | Intercept a specific iOS app using Frida dynamic instrumentation. Automatically disables most certificate pinning. Requires a jailbroken device running Frida Server connected via USB. |
| intercept_jvm | Attach to a running JVM process (Java, Kotlin, Clojure, etc.) to intercept all its HTTP(S) traffic. Uses Java agent attachment. |
| intercept_electron | Launch an Electron application with all its HTTP(S) traffic intercepted. Use get_interceptor_metadata with id "electron" to list available Electron apps. |
| send_http_request | Send an HTTP request through the HTTP Toolkit proxy. The request will be intercepted and visible in the HTTP Toolkit UI. Returns the full response including status code, headers, and body. |
| activate_interceptor | Generic tool to activate any interceptor by ID with custom options. Use the dedicated tools (intercept_chrome, intercept_docker_container, etc.) when possible for better parameter validation. |
| capture_traffic | Capture live HTTP(S) traffic being intercepted by HTTP Toolkit. Creates a temporary session, subscribes to traffic events via WebSocket, collects requests and responses for the specified duration, then returns all captured exchanges. Use this to see what HTTP requests are being made by intercepted browsers, apps, or containers. |
Prompts
Interactive templates invoked by user choice
| Name | Description |
|---|---|
No prompts | |
Resources
Contextual data attached and managed by the client
| Name | Description |
|---|---|
No resources | |