http-toolkit-intercept
HTTP Toolkit Intercept
Use this skill when you need authoritative evidence of what your program sent to a remote API and what it received back while verifying a code change. Works across any runtime — Node.js, Bun, Deno, Python, Go, Ruby, Java/JVM, .NET, PHP, Rust, shell scripts, etc. — as long as the process respects a proxy.
The reliable pattern is:
- Start HTTP Toolkit correctly.
- Run the program through the proxy in a mode that produces a machine-readable log (e.g.
--output-format json, debug logging, or structured stdout). - Export outbound HTTP requests from HTTP Toolkit.
- Pair the outbound HTTP export with the inbound program session log.
Do not rely on TUI screenshots alone when the question is about request payloads, auth headers, or wire-level behavior.
Prerequisites / Known-Good Launch
Start HTTP Toolkit
On Linux/headless environments, plain httptoolkit often fails due to sandbox/X11 issues. Prefer:
More from factory-ai/factory-plugins
no-use-effect
>-
287human-writing
|
126simplify
Review changed code for reuse, quality, and efficiency, then fix any issues found.
91frontend-design
|
85security-review
Scan code changes for security vulnerabilities using STRIDE threat modeling, validate findings for exploitability, and output structured results for downstream patch generation. Supports PR review, scheduled scans, and full repository audits.
73visual-design
|
71