Most problems with AI Leaks Tweaker fall into one of a few categories: the proxy process not starting, HTTPS interception failing due to a missing certificate, flags not being injected into responses, or the application itself not launching. The sections below walk through each scenario with specific log messages to look for and steps to resolve them.Documentation Index
Fetch the complete documentation index at: https://mintlify.com/cloudwaddie/aitweaker/llms.txt
Use this file to discover all available pages before exploring further.
Issues
Proxy won't start
Proxy won't start
When you click Start Proxy, the button reverts to “Start Proxy” almost immediately and the log viewer shows an error. Common causes:mitmproxy is not installed or not on PATHThe default start command is:If Install mitmproxy using pipx (recommended) or pip:Port 8000 is already in useIf another process is listening on port 8000, mitmproxy will fail to bind. Check the log for a message like Remember to update FoxyProxy or your OS proxy settings to match the new port.Wrong or missing start commandThe Start Command field on the Proxy tab must contain the full command to launch mitmproxy with the proxy script. If the field is blank or points to the wrong script path, nothing will start. The default value is:Ensure
mitmdump cannot be found, the log shows something like:Address already in use. Stop the conflicting process, or change the port in the Start Command field:proxy.py is in the same directory from which you are running AI Leaks Tweaker.HTTPS sites show certificate errors
HTTPS sites show certificate errors
After enabling the proxy (via FoxyProxy or OS settings), HTTPS pages show a browser certificate warning. This means the mitmproxy CA certificate has not been trusted by your system or browser.Easy method — mitm.itWhile the proxy is running, click Open mitm.it to Get CA Certificate in the Proxy tab. This opens
Installing on Windows
http://mitm.it in your browser, which serves the correct certificate for your device along with platform-specific installation instructions.Manual methodIf mitm.it does not load, locate the certificate file directly:| Platform | Default certificate path |
|---|---|
| Windows | C:\Users\YourUsername\.mitmproxy\mitmproxy-ca-cert.pem |
| macOS / Linux | ~/.mitmproxy/mitmproxy-ca-cert.pem |
- Double-click the
.pemfile. - Click Install Certificate.
- Select Current User, then click Next.
- Choose Place all certificates in the following store and click Browse.
- Select Trusted Root Certification Authorities and click OK.
- Click Next, then Finish.
Firefox maintains its own certificate store. Even after installing the certificate at the OS level, you may need to import it separately in Firefox under Settings > Privacy & Security > Certificates > View Certificates > Import.
Feature flags not applying in Gemini
Feature flags not applying in Gemini
The proxy is running and intercepting requests, but your Gemini flags do not seem to take effect.Check the Gemini modifications switchThe Enable Gemini Modifications toggle at the top of the Gemini tab must be on. If it is off, the proxy skips flag injection entirely.Confirm the proxy is intercepting the right URLsThe proxy modifies JS modules served from If this line does not appear after a hard refresh, the proxy is not intercepting the script — check the CA certificate installation and proxy routing.rules.json may be staleAfter saving changes in the app,
gemini.gstatic.com or www.gstatic.com under the /_/mss/boq-bard-web/_/js/ path. When a modification succeeds, the log shows:rules.json is regenerated automatically and the proxy reloads it on the next intercepted request. You do not need to restart the proxy manually. If you edited rules.json by hand, the proxy picks up the change the next time it handles a request (it checks the file modification time on every request and response).Browser cacheA normal page reload serves cached JS. Always use a hard refresh (Ctrl+Shift+R on Windows/Linux, Cmd+Shift+R on macOS) to force the browser to re-fetch the script from the network so the proxy can intercept it.Gemini flags are applied but the feature doesn't appear
Gemini flags are applied but the feature doesn't appear
The log shows If Google ships a bundle where this pattern has changed, injection fails and the log shows:Check the project repository for an updated
Modified Gemini ctor but the feature you are looking for is not visible.The ctor pattern may not match the current bundleThe proxy locates flags by patching this exact pattern in the Gemini JS:proxy.py that matches the new bundle structure.You may have the wrong flag IDsUse the binary search tool to systematically identify which exact integer ID enables the feature you are looking for, rather than guessing specific IDs.batchexecute URLs are intentionally skippedThe proxy explicitly ignores gemini.google.com URLs containing batchexecute to prevent breaking API calls. This is by design and does not affect flag injection into JS bundles.Copilot flags not applying
Copilot flags not applying
The proxy modifies Copilot by intercepting the If this message does not appear:If you see
/c/api/start endpoint. When a modification succeeds, the log shows:- Confirm Enable Copilot Modifications is toggled on in the Copilot tab.
- Verify the proxy is running and your browser traffic is routed through it.
- Reload the Copilot page — the
/c/api/startrequest is made during page load. - Check that the CA certificate is installed so HTTPS interception works.
Modified Copilot response but none of the flag lines, confirm that the flags you added are enabled (toggle switch on) and that you clicked Save Copilot Changes.Grok configuration not applied
Grok configuration not applied
The proxy intercepts Fix the error, then click Save Grok Changes.When config injection succeeds, the log shows:If you see this line but the behaviour does not change, the key you modified may not correspond to the feature you expected, or a page reload is required to pick up the new config.Subscription spoofingWhen Spoof Subscription (Pro/Super) is enabled, the proxy replaces subscription-related fields. Successful substitutions are logged individually:
grok.com pages and replaces the server-client-data-experimentation script tag with your custom JSON.Validate the JSON firstInvalid JSON will not be injected. Click Format & Validate JSON in the Grok tab before saving. If the JSON is invalid, the log shows:App won't start or Python errors on launch
App won't start or Python errors on launch
If the application fails to open or crashes immediately, the most likely cause is a missing Python dependency.Re-run the setup scriptThe setup script installs all packages listed in Check your Python versionAI Leaks Tweaker requires Python 3.8 or later. Verify with:If your system Python is older, install a newer version and re-run the setup script in that environment.Run from the correct directoryThe application expects
requirements.txt:proxy.py, rules.json, and profiles.json to be in the working directory. Always launch the app using the provided run scripts (run.bat or run.sh) from the project root, not by double-clicking app.py from a file manager.Reading the proxy log
The log viewer in the Proxy tab shows all output from the mitmproxy process. Lines prefixed with[TERMINAL_LOG] come from proxy.py itself and are the most useful for diagnosing interception issues. Key messages to know:
| Log message | What it means |
|---|---|
proxy.py: Reloaded rules.json. | The proxy detected a change in rules.json and loaded the new configuration. |
Modified Gemini ctor for flags: ... | Gemini JS was successfully patched with the current flag list. |
[WARN] ctor method not found in <url> | The Gemini JS bundle no longer contains the expected pattern; flags were not injected. |
Modified Copilot response: <url> | The Copilot /c/api/start response was modified. |
Modified Grok configuration: <url> | The Grok page config was replaced with your custom JSON. |
proxy.py: Invalid JSON in Grok configuration rules. | The JSON saved for Grok is malformed; use Format & Validate JSON to fix it. |
proxy.py: rules.json not found. Clearing all rules. | rules.json was deleted or moved; no modifications will be applied until it is regenerated. |