Charles Proxy Session Extractor
Transform Charles Proxy sessions into actionable network traffic insights instantly
❌ Manually parsing Charles Proxy session files to extract network traffic data is time-consuming and error-prone.
✅ Quickly extract and analyze HTTP/HTTPS requests, responses, headers, and bodies from Charles Proxy sessions in structured format.
- ✓Extract URLs, methods, status codes from captured requests
- ✓Parse request and response headers automatically
- ✓Retrieve complete request and response body content
- ✓Analyze API calls and HTTP interactions systematically
👁 3 views · 📦 0 installs
Install in one line
CLI$ mfkvault install wannabehero-charles-proxy-extract-skillRequires the MFKVault CLI. Prefer MCP?
Free to install — no account needed
Copy the command below and paste into your agent.
Instant access • No coding needed • No account needed
What you get in 5 minutes
- Full skill code ready to install
- Works with 4 AI agents
- Lifetime updates included
Run this helper
Answer a few questions and let this helper do the work.
▸Advanced: use with your AI agent
Description
--- name: charles-proxy-extract description: Extracts HTTP/HTTPS request and response data from Charles Proxy session files (.chlsj format), including URLs, methods, status codes, headers, request bodies, and response bodies. Use when analyzing captured network traffic from Charles Proxy debug sessions, inspecting API calls, debugging HTTP requests, or examining proxy logs. allowed-tools: Bash --- # Charles Proxy Session Extractor Parses and extracts structured data from Charles Proxy session files (.chlsj format). ## Prerequisites - Python 3.x (no external dependencies required) - Charles Proxy session file in .chlsj format ## When to Use This Skill Use this skill when the user: - Mentions "Charles Proxy" or "Charles session" - Asks to "extract", "analyze", or "inspect" .chlsj files - Wants to filter HTTP/HTTPS requests by endpoint or method - Needs to examine API request/response data from proxy logs - Wants to export network traffic data to JSON ## How to Execute This Skill When the user asks to extract, analyze, or inspect Charles Proxy session files, run the Python script using the Bash tool: ```bash python3 ./extract_responses.py <file.chlsj> <pattern> [options] ``` ### Required Parameters 1. `<file.chlsj>` - Path to the Charles Proxy session file (use exact path provided by user) 2. `<pattern>` - URL path pattern to match (e.g., "/today", "/logs", "/" for all) ### Optional Flags - `-m, --method METHOD` - Filter by HTTP method (GET, POST, PUT, PATCH, DELETE) - `-f, --first-only` - Show only first matching request (for quick inspection) - `-s, --summary-only` - Show statistics without response bodies - `-o, --output FILE` - Save responses to JSON file - `--no-pretty` - Disable JSON pretty-printing ### Execution Examples **Extract all /today responses:** ```bash python3 ./extract_responses.py session.chlsj "/today" ``` **Filter by POST method (automatically shows request bodies):** ```bash python3 ./extract_responses.py session.chlsj "/logs" --method POST ``` **Quick peek (first result only):** ```bash python3 ./extract_responses.py session.chlsj "/users" --first-only ``` **Summary without bodies:** ```bash python3 ./extract_responses.py session.chlsj "/" --summary-only ``` **Export to file:** ```bash python3 ./extract_responses.py session.chlsj "/items" --output items_data.json ``` ### User Request Patterns When users say things like: - "Extract [endpoint] from [file]" → Use basic extraction with pattern matching - "Show POST/PUT/PATCH to [endpoint]" → Add `--method` flag (request bodies auto-shown) - "First [endpoint] response" → Add `--first-only` flag - "Summarize [file]" or "What's in [file]" → Add `--summary-only` flag - "Save [endpoint] to [output]" → Add `--output` flag - "Compare [endpoint] with model" → Extract first response, then analyze structure ### Important Notes - Pattern matching is case-sensitive substring matching - Method filtering is case-insensitive - POST/PUT/PATCH methods automatically display request bodies when method filter is applied - Use `"/"` as pattern to match all requests ## What This Skill Does Extracts HTTP/HTTPS request and response data from Charles Proxy session files, allowing you to: - Filter requests by URL pattern (substring matching) - Filter requests by HTTP method (GET, POST, PUT, PATCH, DELETE) - View request bodies for mutation operations (POST/PUT/PATCH) - Export extracted data to JSON files - Generate traffic summaries with statistics - Pretty-print JSON response bodies ## Input Requirements **Required:** - Path to Charles Proxy session file (.chlsj format) - URL pattern to match (use "/" to match all requests) **Optional:** - HTTP method filter (GET, POST, PUT, PATCH, DELETE) - Output mode (full, first-only, summary-only) - Output file path for JSON export - Pretty-print toggle for JSON formatting ## Output Format **Summary mode:** - Pattern match statistics - Grouped paths with request counts - Method and status code distribution **Full mode:** - Request details (method, path, status, timestamp) - Request body (for POST/PUT/PATCH when method filter applied) - Response body (JSON parsed or raw text) - Pretty-printed JSON by default **Export mode:** - JSON file with structure: ```json { "pattern": "/api/endpoint", "total_requests": 10, "extracted_at": "ISO8601 timestamp", "requests": [...] } ``` ## Common Usage Scenarios **"Extract all /today responses from session.chlsj"** → Shows all requests matching /today pattern **"Show POST requests to /logs with request bodies"** → Filters by POST method and displays request bodies **"Export all /items responses to items.json"** → Saves filtered responses to JSON file **"Summarize requests in the Charles session"** → Shows statistics without response bodies ## Limitations - Only supports Charles Proxy JSON session format (.chlsj) - Pattern matching is case-sensitive substring matching - Method filtering is case-insensitive - Large response bodies may be truncated in display (not in exports) - Requires Python 3.x with standard library only (no external dependencies) ## Error Handling The skill handles: - Missing or inaccessible files (clear error message) - Invalid JSON in session files (decoding error details) - Empty result sets (informative message) - Malformed request/response structures (graceful degradation) ## Troubleshooting **"File not found" error:** - Verify the .chlsj file path is correct - Use absolute paths or ensure the file is in the current directory **"Invalid JSON" error:** - Ensure the file is a valid Charles Proxy session export - Re-export the session from Charles Proxy **No results found:** - Pattern matching is case-sensitive - check capitalization - Try using "/" to match all requests first - Verify the endpoint exists in the session file using --summary-only **Python not found:** - Ensure Python 3.x is installed and available in PATH - Try using `python` instead of `python3` or vice versa
Security Status
Verified
Manually verified by security team
Related AI Tools
More Career Boost tools you might like
ru-text — Russian Text Quality
FreeApplies professional Russian typography, grammar, and style rules to improve text quality across content types
/forge:工作流总入口
Free'Forge 工作流总入口。检查项目状态,推荐下一步该用哪个 skill。任何时候不知道下一步该干什么,就用 /forge。触发方式:用户说"forge"、"下一步"、"接下来做什么"、"继续"(在没有明确上下文时)。'
Java Backend Interview Simulator
FreeSimulates realistic Java backend technical interviews with customizable interviewer styles and candidate levels for Chinese tech companies
TypeScript React & Next.js Production Patterns
FreeProduction-grade TypeScript reference for React & Next.js covering type safety, component patterns, API validation, state management, and debugging
AI News & Trends Intelligence
FreeFetches latest AI/ML news, trending open-source projects, and social media discussions from 75+ curated sources for comprehensive AI briefings
Tlon Skill
FreeInteract with Tlon/Urbit API. Use for reading activity, message history, contacts, channels, and groups. Also for group/channel administration, profile management, and exposing content to the clearweb.