npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

@mtford/htap

v0.9.0

Published

Terminal HTTP interception toolkit

Downloads

99

Readme

htap

npm version CI License: MIT

Htap is a terminal-based, project-scoped HTTP proxy with a powerful CLI, TUI & MCP server. Quickly intercept, inspect & rewrite HTTP traffic from the comfort of your terminal or favourite AI agent.

htap demo

Feature Highlights

  • Project-scoped — each project gets its own .htap/ directory with a separate daemon, database, CA cert and interceptors
  • MCP server — AI agents get full access to your captured traffic and can search, filter, inspect, mock — all via tool calls.
  • Interceptors — mock, modify or observe traffic by writing typescript. Agent can do this over MCP meaning you can express complex scenarios in natural language!

Quick Start

npm install -g @mtford/htap

# Configure environment e.g. HTTP_PROXY
eval "$(htap on)"

# Send a request
curl https://api.example.com/users

# Open UI
htap tui

# Add MCP server to your AI tool
claude mcp add htap -- htap mcp

Browser Interception

Launch any browser pre-configured to route through htap — no manual proxy setup, no certificate warnings:

# Auto-detect and launch your default browser
htap browser

# Open a specific URL
htap browser https://example.com

# Choose a specific browser
htap browser --browser firefox
htap browser --browser brave

Each browser session gets its own isolated profile and is automatically attributed in the TUI (e.g. source: chrome). Close the browser or press Ctrl+C to stop — the temp profile is cleaned up automatically.

Supported browsers:

| Engine | Browsers | | -------- | ------------------------------------------- | | Chromium | Chrome, Brave, Edge, Vivaldi, Arc, Chromium | | Firefox | Firefox, Zen Browser, LibreWolf |

Project Scoping

htap doesn't use a global system proxy. Each project gets its own .htap/ directory in the project root (detected by .git or an existing .htap/):

your-project/
├── .htap/
│   ├── interceptors/   # TypeScript interceptor files
│   ├── config.json     # Optional project config
│   ├── proxy.port      # Proxy TCP port
│   ├── control.sock    # IPC socket
│   ├── requests.db     # Captured traffic
│   ├── ca.pem          # CA certificate
│   └── daemon.pid      # Process ID
└── src/...

Separate daemon, database, certificates etc. You can run htap in multiple projects at the same time without them interfering with each other.

For non-project contexts or custom setups, use --config to point directly at a data directory (no .htap appended):

htap --config /tmp/my-htap-data on

See CLI Reference for the full resolution order (--config > --dir > auto-detect).

MCP Integration

htap has a built-in MCP server that gives AI agents full access to your captured traffic and interceptor system.

Setup

Claude Code:

claude mcp add htap -- htap mcp

Codex:

codex mcp add htap -- htap mcp

Cursor — add to .cursor/mcp.json:

{
  "mcpServers": {
    "htap": {
      "command": "htap",
      "args": ["mcp"]
    }
  }
}

Other MCP clients (Windsurf, etc.) — add to your client's MCP config:

{
  "mcpServers": {
    "htap": {
      "command": "htap",
      "args": ["mcp"]
    }
  }
}

The proxy must be running (eval "$(htap on)") — the MCP server connects to the same daemon as the TUI.

Available Tools

| Tool | Description | | -------------------------- | ---------------------------------------------------- | | htap_get_status | Daemon status, proxy port, request count | | htap_list_requests | Search and filter captured requests | | htap_get_request | Full request details by ID (headers, bodies, timing) | | htap_search_bodies | Full-text search through body content | | htap_query_json | Extract values from JSON bodies via JSONPath | | htap_count_requests | Count matching requests | | htap_clear_requests | Delete all captured requests | | htap_list_sessions | List active proxy sessions | | htap_list_interceptors | List loaded interceptors with status and errors | | htap_reload_interceptors | Reload interceptors from disk |

See full MCP documentation for filtering, output formats, and examples.

Interceptors

TypeScript files in .htap/interceptors/ that intercept HTTP traffic as it passes through the proxy. They can return mock responses, modify upstream responses, or just observe.

import type { Interceptor } from "@mtford/htap/interceptors";

export default {
  name: "mock-users",
  match: (req) => req.path === "/api/users",
  handler: async () => ({
    status: 200,
    headers: { "content-type": "application/json" },
    body: JSON.stringify([{ id: 1, name: "Alice" }]),
  }),
} satisfies Interceptor;

See full interceptors documentation for modify, observe, querying past traffic, handler context, and how they work.

How It Works

┌─────────────────────────────────────────────────────────────┐
│  Your Shell                                                 │
│  ┌─────────────────────────────────────────────────────┐   │
│  │  curl, wget, node, python...                        │   │
│  │          │                                          │   │
│  │          ▼                                          │   │
│  │  HTTP_PROXY=localhost:54321                         │   │
│  └─────────────────────────────────────────────────────┘   │
│                          │                                  │
└──────────────────────────┼──────────────────────────────────┘
                           ▼
┌─────────────────────────────────────────────────────────────┐
│  htap daemon                                                │
│  ┌─────────────┐    ┌─────────────┐    ┌─────────────┐     │
│  │ MITM Proxy  │───▶│   SQLite    │◀───│ Control API │     │
│  │  (mockttp)  │    │  requests   │    │ (unix sock) │     │
│  └─────────────┘    └─────────────┘    └─────────────┘     │
└─────────────────────────────────────────────────────────────┘
                           ▲
                           │
┌──────────────────────────┼──────────────────────────────────┐
│  htap tui                │                                  │
│  ┌───────────────────────┴─────────────────────────────┐   │
│  │ ● POST /api/users   │ POST https://api.example.com  │   │
│  │   GET  /health      │ Status: 200 │ Duration: 45ms  │   │
│  │   POST /login       │                               │   │
│  │                     │ Request Headers:              │   │
│  │                     │   Content-Type: application/  │   │
│  └─────────────────────┴───────────────────────────────┘   │
└─────────────────────────────────────────────────────────────┘

eval "$(htap on)" starts a daemon, sets HTTP_PROXY/HTTPS_PROXY in your shell, and captures everything that flows through. eval "$(htap off)" unsets them. The TUI connects to the daemon via Unix socket.

Environment Variables

eval "$(htap on)" sets these in your shell (eval "$(htap off)" unsets them):

| Variable | Purpose | | --------------------- | ------------------------------------ | | HTTP_PROXY | Proxy URL for HTTP clients | | HTTPS_PROXY | Proxy URL for HTTPS clients | | SSL_CERT_FILE | CA cert path (curl, OpenSSL) | | REQUESTS_CA_BUNDLE | CA cert path (Python requests) | | CURL_CA_BUNDLE | CA cert path (curl/Python fallback) | | NODE_EXTRA_CA_CERTS | CA cert path (Node.js) | | DENO_CERT | CA cert path (Deno) | | CARGO_HTTP_CAINFO | CA cert path (Rust Cargo) | | GIT_SSL_CAINFO | CA cert path (Git) | | AWS_CA_BUNDLE | CA cert path (AWS CLI) | | CGI_HTTP_PROXY | Proxy URL (PHP CGI, HTTPoxy-safe) | | HTAP_SESSION_ID | UUID identifying the current session | | HTAP_LABEL | Session label (when -l flag used) |

Additionally, htap on sets PYTHONPATH, RUBYOPT, and PHP_INI_SCAN_DIR to load runtime-specific override scripts that ensure edge-case HTTP clients trust the proxy CA.

Configuration

Create .htap/config.json to override defaults:

{
  "maxStoredRequests": 5000,
  "maxBodySize": 10485760,
  "maxLogSize": 10485760,
  "pollInterval": 2000
}

See full configuration documentation for details on each setting.

Supported HTTP Clients

Anything that respects HTTP_PROXY works. htap sets the right CA cert env vars for each runtime automatically.

Works automatically (env vars only):

| Client | Support | | ------------------- | ------------------------------- | | curl | Automatic | | wget | Automatic | | Go (net/http) | Automatic | | Rust (reqwest) | Automatic | | .NET (HttpClient) | Automatic | | Deno | Automatic (DENO_CERT) | | Bun | Automatic (SSL_CERT_FILE) | | Git | Automatic (GIT_SSL_CAINFO) | | AWS CLI | Automatic (AWS_CA_BUNDLE) | | Cargo | Automatic (CARGO_HTTP_CAINFO) |

Works with htap overrides (injection scripts):

| Client | Mechanism | | ---------------------------- | --------------------------------------- | | Node.js (fetch, axios, etc.) | NODE_OPTIONS --require preload script | | Python (requests, httplib2) | PYTHONPATH sitecustomize.py | | Ruby (Net::HTTP, gems) | RUBYOPT -r OpenSSL CA patch | | PHP (curl, streams) | PHP_INI_SCAN_DIR custom INI |

Not currently supported (needs system-level config):

| Runtime | Reason | | ------------- | -------------------------------------------- | | Java/JVM | Needs -javaagent or JVM trust store config | | Swift | Uses macOS Keychain only | | Dart/Flutter | Requires code changes for proxy | | Elixir/Erlang | Requires code changes for proxy |

TUI

j/k to navigate, Tab to switch panels, / to filter, e to export, Enter to inspect bodies, q to quit. Mouse support included.

See full TUI documentation for all keybindings and export features.

Documentation

Development

git clone https://github.com/mtford90/htap.git
cd htap
npm install

npm run build        # Compile TypeScript
npm test             # Run all tests
npm run typecheck    # Type checking only
npm run lint         # ESLint
npm run dev          # Watch mode

Troubleshooting

Certificate errors

htap sets common CA environment variables automatically, but some tools need manual configuration:

cat .htap/ca.pem

Daemon won't start

Check if something else is using the socket:

htap status
htap daemon stop
eval "$(htap on)"

Requests not appearing

Your HTTP client needs to respect proxy environment variables.

There are workarounds implemented for node - e.g. fetch override. Other libraries in different environments may need a similar treatment.

Acknowledgements

htap is built on top of MockTTP by Tim Perry, the same MITM proxy engine that powers HTTP Toolkit.

Licence

MIT