Get aiproxy running as a transparent forward proxy in a few steps.
Run the installation script to fetch the latest release:
curl -fsSL https://aiproxy.dev/install | bashThe script will:
- Detect your operating system and architecture
- Download the appropriate binary
- Install it to
~/.aiproxy/bin - Make it executable
- Linux (x86_64, aarch64)
- macOS (Intel, Apple Silicon)
- Windows (native, or via WSL)
aiproxy automatically generates a CA certificate authority and key in ~/.aiproxy on the first run. This CA must be installed to your operating system for aiproxy to be able to intercept TLS traffic.
sudo security add-trusted-cert \
-d \
-p ssl \
-p basic \
-k /Library/Keychains/System.keychain \
~/.aiproxy/aiproxy-ca-cert.pemsudo trust anchor --store ~/.aiproxy/aiproxy-ca-cert.pem{
security.pki.certificates = [''<content of aiproxy-ca-cert.pem>''];
}If you use Windows Subsystem for Linux (WSL), follow the Linux steps. For native Windows applications, run PowerShell as administrator and install the certificate:
Import-Certificate `
-FilePath C:\path\to\aiproxy-ca-crt.pem `
-CertStoreLocation "Cert:\CurrentUser\Root"Provide your own certificate authority instead of the generated files by saving a configuration like the following to aiproxy.toml:
[tls_interception.certificate_authority]
cert = "/path/to/ca.crt"
key = "/path/to/ca.key"Start the proxy with that config file to load your certificates:
aiproxy --config aiproxy.tomlOnce aiproxy is running and trusted, follow the agent-specific guides:
- Claude Code – Proxy Anthropic CLI or desktop requests
- Codex – Route GitHub Copilot CLI traffic
- Cursor – Configure Cursor to use the HTTP proxy
- VS Code Copilot – Forward Copilot through
aiproxy, including Flatpak sandbox steps - Web browsers – Intercept browser sessions via forward proxy mode