intercept_android_adb
Intercept HTTP(S) traffic from Android devices via ADB for debugging. Automatically injects HTTPS certificates into rooted devices and emulators to monitor network activity.
Instructions
Intercept HTTP(S) traffic from an Android device or emulator connected via ADB. Automatically injects system HTTPS certificates into rooted devices and most emulators.
Input Schema
TableJSON Schema
| Name | Required | Description | Default |
|---|---|---|---|
| proxyPort | Yes | Proxy port to route traffic through | |
| deviceId | Yes | ADB device ID. Use get_interceptor_metadata with id "android-adb" to list connected devices. | |
| enableSocks | No | Enable SOCKS proxy support (default: false) |
Implementation Reference
- src/index.ts:210-223 (handler)The tool 'intercept_android_adb' is registered in src/index.ts. The handler calls `client.activateInterceptor` with 'android-adb' as the interceptor type.
server.registerTool( 'intercept_android_adb', { title: 'Intercept Android Device via ADB', description: 'Intercept HTTP(S) traffic from an Android device or emulator connected via ADB. Automatically injects system HTTPS certificates into rooted devices and most emulators.', inputSchema: z.object({ proxyPort: z.number().describe('Proxy port to route traffic through'), deviceId: z.string().describe('ADB device ID. Use get_interceptor_metadata with id "android-adb" to list connected devices.'), enableSocks: z.boolean().optional().describe('Enable SOCKS proxy support (default: false)'), }), }, async ({ proxyPort, deviceId, enableSocks }) => jsonResult(await client.activateInterceptor('android-adb', proxyPort, { deviceId, enableSocks })) );