Skip to main content
Glama

proxy_set_ja3_spoof

Spoof TLS fingerprint (JA3) for HTTPS requests using a default Chrome preset. Legacy tool replaced by proxy_set_fingerprint_spoof.

Instructions

Legacy: enable fingerprint spoofing (deprecated, use proxy_set_fingerprint_spoof with a preset). The ja3 parameter is accepted but ignored — the default Chrome preset is used.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
ja3YesJA3 fingerprint string (ignored — use proxy_set_fingerprint_spoof with a preset instead)
user_agentNoUser-Agent header to use with spoofed requests
host_patternsNoOnly spoof requests to hostnames containing these substrings. Empty = spoof all HTTPS.

Implementation Reference

  • Tool registration for 'proxy_set_ja3_spoof' via server.tool() — a legacy/deprecated MCP tool that accepts ja3 (ignored), user_agent, and host_patterns parameters.
    server.tool(
      "proxy_set_ja3_spoof",
      "Legacy: enable fingerprint spoofing (deprecated, use proxy_set_fingerprint_spoof with a preset). The ja3 parameter is accepted but ignored — the default Chrome preset is used.",
      {
        ja3: z.string().describe("JA3 fingerprint string (ignored — use proxy_set_fingerprint_spoof with a preset instead)"),
        user_agent: z.string().optional().describe("User-Agent header to use with spoofed requests"),
        host_patterns: z.array(z.string()).optional().describe("Only spoof requests to hostnames containing these substrings. Empty = spoof all HTTPS."),
      },
      async ({ ja3: _ja3, user_agent, host_patterns }) => {
        try {
          await proxyManager.setJa3Spoof({
            userAgent: user_agent,
            hostPatterns: host_patterns,
          });
    
          return {
            content: [{
              type: "text" as const,
              text: JSON.stringify({
                status: "success",
                message: "Fingerprint spoofing enabled with default Chrome preset. Use proxy_set_fingerprint_spoof with a preset for explicit control.",
                config: { userAgent: user_agent, hostPatterns: host_patterns ?? [] },
              }),
            }],
          };
        } catch (e) {
          return { content: [{ type: "text" as const, text: JSON.stringify({ status: "error", error: String(e) }) }] };
        }
      },
    );
  • Handler function that receives { ja3, user_agent, host_patterns }, ignores ja3, and calls proxyManager.setJa3Spoof() with user_agent and host_patterns.
      async ({ ja3: _ja3, user_agent, host_patterns }) => {
        try {
          await proxyManager.setJa3Spoof({
            userAgent: user_agent,
            hostPatterns: host_patterns,
          });
    
          return {
            content: [{
              type: "text" as const,
              text: JSON.stringify({
                status: "success",
                message: "Fingerprint spoofing enabled with default Chrome preset. Use proxy_set_fingerprint_spoof with a preset for explicit control.",
                config: { userAgent: user_agent, hostPatterns: host_patterns ?? [] },
              }),
            }],
          };
        } catch (e) {
          return { content: [{ type: "text" as const, text: JSON.stringify({ status: "error", error: String(e) }) }] };
        }
      },
    );
  • Input schema for proxy_set_ja3_spoof: ja3 (required string, but ignored), user_agent (optional string), host_patterns (optional string array).
    {
      ja3: z.string().describe("JA3 fingerprint string (ignored — use proxy_set_fingerprint_spoof with a preset instead)"),
      user_agent: z.string().optional().describe("User-Agent header to use with spoofed requests"),
      host_patterns: z.array(z.string()).optional().describe("Only spoof requests to hostnames containing these substrings. Empty = spoof all HTTPS."),
    },
  • ProxyManager.setJa3Spoof() — delegates to setFingerprintSpoof() which stores the config and triggers a mockttp rule rebuild.
    async setJa3Spoof(config: FingerprintSpoofConfig): Promise<void> {
      return this.setFingerprintSpoof(config);
    }
  • ProxyManager.setFingerprintSpoof() — stores the FingerprintSpoofConfig and if running, rebuilds mockttp rules to apply the spoofing.
    async setFingerprintSpoof(config: FingerprintSpoofConfig): Promise<void> {
      this._ja3SpoofConfig = config;
      if (this._running) await this.rebuildMockttpRules();
    }
Behavior4/5

Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?

With no annotations, the description carries full burden. It reveals that the ja3 parameter is ignored and that the default Chrome preset is used. This is key behavioral info. However, it does not disclose whether the spoofing applies immediately or requires a restart, which would be helpful but not critical for a legacy tool.

Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.

Conciseness5/5

Is the description appropriately sized, front-loaded, and free of redundancy?

Two sentences, zero waste. Every word earns its place. Front-loaded with 'Legacy' and deprecation, then the key behavioral note.

Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.

Completeness4/5

Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?

For a legacy tool with no output schema and clear deprecation, the description covers what it does, what to use instead, and the ignored parameter. It doesn't explain the effect on traffic or session state, but given its deprecated status, this is minimally sufficient.

Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.

Parameters4/5

Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?

Schema coverage is 100%, so baseline is 3. The description adds value by noting that the ja3 parameter is ignored and that the default Chrome preset is used, which goes beyond the schema's description ('ignored') by specifying the default behavior.

Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.

Purpose5/5

Does the description clearly state what the tool does and how it differs from similar tools?

Clearly states it enables fingerprint spoofing, marks itself as legacy, and directly names the replacement tool. The verb 'enable' and resource 'fingerprint spoofing' are specific, and it distinguishes from the sibling proxy_set_fingerprint_spoof.

Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.

Usage Guidelines5/5

Does the description explain when to use this tool, when not to, or what alternatives exist?

Explicitly says it's deprecated and instructs to use proxy_set_fingerprint_spoof instead. Also clarifies that the ja3 parameter is ignored, so agents know not to rely on it. Provides both when-not and alternative.

Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.

Install Server

Other Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/yfe404/proxy-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server