Documentation Index
Fetch the complete documentation index at: https://authsome.mbajaj.me/llms.txt
Use this file to discover all available pages before exploring further.
authsome run starts a local mitmproxy-based HTTP proxy. Most issues come down to TLS certificate trust or interactions with corporate proxies.
For background, see Proxy injection.
TLS verification fails
~/.mitmproxy/mitmproxy-ca-cert.pem. There are two ways to trust it.
Quick install with mitm.it (recommended)
mitmproxy ships a built-in cert installer at the magic domain mitm.it. While authsome run is active, open a browser on the same machine and visit:
Manual install per OS
If themitm.it quick install isn’t an option (server with no browser, automated provisioning), install the CA manually:
- macOS
- Debian / Ubuntu
- Fedora / RHEL
- Windows
Python tooling needs an explicit CA bundle
The Pythonrequests and httpx libraries use their own certifi-based CA bundle, not the system store. Point them at the mitmproxy CA:
Pinned TLS certificates
Some SDKs ship with a pinned certificate or chain (notably mobile SDKs and a few API clients). They reject mitmproxy’s CA even when the system trust store accepts it. There is no way to MITM these connections without bypassing the SDK’s pinning. Useauthsome export instead of authsome run for those cases:
Proxy is not intercepting requests
The agent is making calls but no auth header is being injected.Check the env vars in the child
authsome --verbose run -- ... for startup errors.
The host doesn’t match any provider’s host_url
The proxy only injects auth for requests whose host matches a provider’s host_url. Confirm the destination host:
host_url.
Two providers claim the same host
When two providers’host_url patterns match the same request, authsome refuses to inject and forwards unchanged. This shows up in the proxy logs as ambiguous host match. Resolve by removing or renaming one of the providers, or by tightening one host_url to a more specific regex.
Corporate / upstream proxy
If you sit behind a corporate proxy, your shell already hasHTTP_PROXY set. authsome run overwrites these variables for the child, so the corporate proxy is bypassed inside the child process. Two ways to handle this:
- Use
authsome exportfor the agent and let the corporate proxy stay in place. This skips authsome’s proxy entirely. - Chain proxies. Set
--upstreamon mitmproxy via the underlying configuration. This is not currently exposed through the authsome CLI; for now, prefer option 1 in corporate-proxy environments.
Non-HTTP traffic is not intercepted
Authsome only intercepts HTTP(S). The following connections bypass the proxy entirely:- WebSocket connections (
wss://) - gRPC over HTTP/2 with custom transports
- Database connections (Postgres, MySQL, Redis)
- Raw TCP connections
- SSH
authsome export, or design the agent so the credential-bearing calls go over HTTP(S).
What’s next
Proxy injection
The full proxy routing contract.
Run agents with the proxy
The end-to-end guide for
authsome run.