Skip to main content

proxy

Interactive MCP traffic interceptor — “Burp Suite for MCP.” Sits between client and server, intercepting JSON-RPC messages for inspection, modification, and replay.

proxy start

Start the proxy with the interactive TUI.
counteragent proxy start [OPTIONS]
OptionRequiredDescription
--transportYesTransport type: stdio, sse, or streamable-http
--target-commandWhen --transport stdioServer command to proxy
--target-urlWhen --transport sse or streamable-httpServer URL to proxy
--interceptNoStart in intercept mode (default: off)
--listen-portNoLocal port for SSE/HTTP (default: 8888)
--session-fileNoAuto-save session to this file
counteragent proxy start \
  --transport stdio \
  --target-command "python my_server.py"

proxy replay

Replay a captured session against a live server.
counteragent proxy replay [OPTIONS]
OptionRequiredDescription
--session-fileYesPath to a saved session file
--target-commandYes*Server command for replay (stdio)
--target-urlNoServer URL for replay (not yet implemented)
--outputNoSave replay results to JSON
--timeoutNoPer-message response timeout in seconds (default: 10.0)
--no-handshakeNoSkip auto-handshake if session already includes initialize
counteragent proxy replay \
  --session-file session.json \
  --target-command "python my_server.py"

proxy export

Export a session to JSON.
counteragent proxy export [OPTIONS]
OptionRequiredDescription
--session-fileYesPath to a saved session file
--outputYesOutput file path
--output-formatNoExport format (default: json)
counteragent proxy export \
  --session-file session.json \
  --output report.json

proxy inspect

Print session contents to stdout (non-interactive).
counteragent proxy inspect [OPTIONS]
OptionRequiredDescription
--session-fileYesPath to a saved session file
--verbose / -vNoShow full JSON payloads
counteragent proxy inspect --session-file session.json -v