MCP Catalogs
HomeCharles-mcp screenshot

Charles-mcp

by heizaheiza·233·Score 51

A production-ready MCP server for integrating Charles Proxy with AI agents, enabling real-time traffic capture and analysis.

developer-toolssecuritymonitoring
28
Forks
0
Open issues
1 mo ago
Last commit
2d ago
Indexed

Overview

Charles MCP Server provides a structured interface for AI agents to interact with Charles Proxy, enabling both live traffic monitoring and historical packet analysis. The server implements a summary-first approach where agents can initially get traffic overviews before drilling down into specific requests. Version 3.0 extends capabilities to support reverse engineering workflows, including request replay, signature analysis, and live reverse analysis sessions. The implementation focuses on optimizing token usage by filtering null values, reducing payload sizes, and providing compact previews by default.

Try asking AI

After installing, here are 5 things you can ask your AI assistant:

you:Real-time API monitoring and analysis for security research
you:Reverse engineering authentication mechanisms and APIs
you:Automated network traffic inspection for testing and debugging
you:Does this require Charles Proxy to be installed?
you:Can this be used for automated testing?

When to choose this

Choose this when you need AI agents to analyze HTTP traffic patterns, reverse engineer APIs, or perform security assessments with a structured approach that minimizes token usage while allowing deep inspection.

When NOT to choose this

Don't choose this if you need to analyze non-HTTP protocols, if Charles Proxy is not already part of your workflow, or if you require a simpler traffic inspection tool without reverse engineering capabilities.

Tools this server exposes

12 tools extracted from the README
  • start_live_capture

    Start or take over current live capture, returning a capture_id

  • read_live_capture

    Incrementally read live capture returning only compact route summaries

  • peek_live_capture

    Preview new traffic without advancing cursor, returning only compact route summaries

  • stop_live_capture

    End capture and optionally persist snapshot

  • query_live_capture_entries

    Structure summary of live capture without advancing cursor

  • group_capture_analysis

    Aggregate and group live or history results by host/path/status

  • get_traffic_entry_detail

    Read single entry's detail with warnings for large responses

  • analyze_recorded_traffic

    Analyze specified recording or latest recording with structured summary

  • list_recordings

    List currently saved recording files

  • charles_status

    Check Charles connection status and current live capture state

  • reverse_import_session

    Import official Charles XML/native session into canonical reverse store

  • reverse_replay_entry

    Replay single imported request with optional parameter variations

Comparable tools

mitmproxy-mcpwebpagetest-mcpwireshark-mcpfiddler-mcp

Installation

Quick Installation

  1. Ensure Charles Proxy is running with Web Interface enabled (Proxy → Web Interface Settings, username: admin, password: 123456)
  1. For Claude Desktop:
{
  "mcpServers": {
    "charles": {
      "command": "uvx",
      "args": ["charles-mcp"],
      "env": {
        "CHARLES_USER": "admin",
        "CHARLES_PASS": "123456",
        "CHARLES_MANAGE_LIFECYCLE": "false"
      }
    }
  }
}
  1. For Claude Code CLI:
claude mcp add-json charles '{
  "type": "stdio",
  "command": "uvx",
  "args": ["charles-mcp"],
  "env": {
    "CHARLES_USER": "admin",
    "CHARLES_PASS": "123456",
    "CHARLES_MANAGE_LIFECYCLE": "false"
  }
}'

FAQ

Does this require Charles Proxy to be installed?
Yes, you need to have Charles Proxy installed and running with the Web Interface enabled.
Can this be used for automated testing?
Yes, the server provides tools for automated traffic analysis, request replay, and signature analysis suitable for testing workflows.

Compare Charles-mcp with

GitHub →

Last updated · Auto-generated from public README + GitHub signals.