Skip to main content
Glama

Intercept iOS App via Frida

frida_ios_intercept

Intercept iOS app traffic using Frida dynamic instrumentation to inspect and debug HTTP(S) communications, with automatic certificate pinning bypass for jailbroken devices.

Instructions

Intercept a specific iOS app using Frida dynamic instrumentation. Automatically disables most certificate pinning. Requires a jailbroken device running Frida Server connected via USB.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
proxyPortYesProxy port to route traffic through
hostIdYesFrida host ID. Use get_interceptor_metadata with id "ios-frida" to list available hosts.
targetIdYesTarget app identifier. Use get_interceptor_metadata with id "ios-frida" and subId set to the hostId to list available app targets.
enableSocksNoEnable SOCKS proxy support (default: false)

Implementation Reference

  • src/index.ts:275-291 (registration)
    Registration of the 'frida_ios_intercept' tool, including input schema and handler function calling client.activateInterceptor.
    server.registerTool(
      'frida_ios_intercept',
      {
        title: 'Intercept iOS App via Frida',
        description: 'Intercept a specific iOS app using Frida dynamic instrumentation. Automatically disables most certificate pinning. Requires a jailbroken device running Frida Server connected via USB.',
        inputSchema: z.object({
          proxyPort: z.number().describe('Proxy port to route traffic through'),
          hostId: z.string().describe('Frida host ID. Use get_interceptor_metadata with id "ios-frida" to list available hosts.'),
          targetId: z.string().describe('Target app identifier. Use get_interceptor_metadata with id "ios-frida" and subId set to the hostId to list available app targets.'),
          enableSocks: z.boolean().optional().describe('Enable SOCKS proxy support (default: false)'),
        }),
      },
      async ({ proxyPort, hostId, targetId, enableSocks }) =>
        jsonResult(await client.activateInterceptor('ios-frida', proxyPort, {
          action: 'intercept', hostId, targetId, enableSocks
        }))
    );
Behavior3/5

Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?

With no annotations provided, the description carries the full burden. It discloses key behavioral traits: it's an interception tool (implies read/write access), automatically disables certificate pinning, and has specific prerequisites. However, it doesn't mention potential side effects (e.g., app instability), performance impact, or what happens after interception ends.

Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.

Conciseness5/5

Is the description appropriately sized, front-loaded, and free of redundancy?

The description is extremely concise (two sentences) and front-loaded with the core purpose. Every word earns its place by specifying the target (iOS app), method (Frida), key feature (certificate pinning disable), and prerequisites without any fluff.

Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.

Completeness3/5

Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?

Given the complexity (interception tool with security implications), no annotations, and no output schema, the description is somewhat incomplete. It covers the what and prerequisites but lacks details on what the interception actually captures, how to use the proxy port, error conditions, or expected outcomes. For a tool with this level of complexity, more behavioral context would be helpful.

Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.

Parameters3/5

Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?

Schema description coverage is 100%, so the schema already documents all parameters thoroughly. The description adds no additional parameter information beyond what's in the schema, maintaining the baseline score of 3 for adequate coverage through structured data alone.

Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.

Purpose5/5

Does the description clearly state what the tool does and how it differs from similar tools?

The description clearly states the specific action ('Intercept a specific iOS app') using a specific method ('using Frida dynamic instrumentation'), distinguishes it from siblings by specifying iOS (vs. Android in other Frida tools), and mentions automatic certificate pinning disablement.

Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.

Usage Guidelines4/5

Does the description explain when to use this tool, when not to, or what alternatives exist?

The description provides clear prerequisites ('Requires a jailbroken device running Frida Server connected via USB') which indicates when this tool can be used. However, it doesn't explicitly state when to choose this tool versus alternatives like 'frida_android_intercept' or 'intercept_ios_adb' (if that existed), though the iOS focus provides some implicit differentiation.

Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.

Install Server

Other Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/fdciabdul/httptoolkit-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server