Skip to main content

Documentation Index

Fetch the complete documentation index at: https://mintlify.com/cloudwaddie/aitweaker/llms.txt

Use this file to discover all available pages before exploring further.

AI Leaks Tweaker intercepts HTTPS traffic by running a local mitmproxy instance on port 8000. For this to work, your browser or operating system must be told to route traffic through the proxy, and you must install mitmproxy’s CA certificate so the tool can decrypt and modify encrypted responses. This page walks through every step.

Start the proxy

The GUI manages the mitmproxy process for you. Under the hood it runs:
mitmdump -s proxy.py -p 8000
1

Open the Proxy tab

Launch AI Leaks Tweaker (run.bat on Windows, ./run.sh on macOS/Linux), then click the Proxy tab in the main window.
2

Click Start Proxy

Click the Start Proxy button. AI Leaks Tweaker starts mitmdump in the background with the proxy.py addon script listening on port 8000.
3

Confirm the proxy is running

The real-time log viewer in the Proxy tab shows output from the proxy process. You should see log lines appear as traffic is intercepted. If you see an error, check that mitmdump is installed and available on your PATH (pipx install mitmproxy).
The Proxy tab includes a custom start command field in its settings. You can override the default mitmdump command there if you need extra mitmproxy options (such as --ssl-insecure or --listen-host).

Install the CA certificate

mitmproxy uses a custom root certificate to decrypt HTTPS traffic. You must install this certificate as a trusted root authority on your system before the proxy can modify AI responses.
Installing a CA certificate grants that certificate the authority to sign any TLS certificate your device trusts. Only install the mitmproxy certificate on devices you control, and remove it if you stop using AI Leaks Tweaker.
1

Start the proxy (if not already running)

The CA certificate is only served by mitmproxy while it is running. Make sure you have completed the steps above and the proxy is active.
2

Install the certificate

Choose one of the two methods below:Easy method (recommended): In the Proxy tab, click Open mitm.it to Get CA Certificate. This opens http://mitm.it in your browser — a special page served by the running mitmproxy instance. Select your operating system and follow the on-screen download and installation instructions.Manual method: If the button does not work, locate the certificate file directly:
The certificate is at:
~/.mitmproxy/mitmproxy-ca-cert.pem
On macOS, double-click the file and add it to your System keychain, then open Keychain Access, find the mitmproxy certificate, and set it to Always Trust under TLS.

Configure your system proxy

After the certificate is installed, point your OS network settings (or your browser) to the local proxy.
1

Open proxy settings

Go to Settings > Network & Internet > Proxy.
2

Enable the manual proxy

Under Manual proxy setup, turn on Use a proxy server.
3

Enter the proxy address

Set Address to 127.0.0.1 and Port to 8000, then click Save.
For more granular control, use a browser extension such as FoxyProxy instead of a system-wide proxy. Configure it with host 127.0.0.1 and port 8000, then toggle it from your browser toolbar only when you want to use the tweaker. This leaves the rest of your system’s network traffic unaffected.

Monitor traffic in real time

The Proxy tab in AI Leaks Tweaker includes a live log viewer that displays output from the mitmdump process as it runs. Each intercepted and modified request is logged with a [TERMINAL_LOG] prefix — for example:
[TERMINAL_LOG] Modified Gemini ctor for flags: exact=[12345], ranges=[]
[TERMINAL_LOG] Injected 3 new Copilot flags.
[TERMINAL_LOG] proxy.py: Reloaded rules.json.
Use this view to confirm that the proxy is intercepting requests for the AI services you have configured in the tweaker tabs.

Build docs developers (and LLMs) love