| ▲ | mdavid626 3 hours ago |
| How do you intercept network traffic on mac os? How do you fake certificates? |
|
| ▲ | afshinmeh 3 hours ago | parent [-] |
| Zerobox creates a cert in `~/.zerobox/cert` on the first proxy run and reuses that. The MTIM process uses that cert to make the calls, inject certs, etc. This is actually done by the underlying Codex crate. |
| |
| ▲ | mdavid626 3 hours ago | parent [-] | | Yeah, but how does the sandboxed process “know” that it has to go through the proxy? How does it trust your certificate? Is the proxy fully transparent? | | |
| ▲ | afshinmeh 3 hours ago | parent [-] | | Oh I see. It inject HTTP_PROXY/HTTPS_PROXY/etc. env vars into the process so that all sandboxed subprocesses go through the proxy. |
|
|