Configuration
Open Settings → Network and configure:| Field | Description | Example |
|---|---|---|
| Enable Proxy | Toggle proxy routing on/off | — |
| HTTP Proxy | Proxy URL for HTTP requests | http://proxy.corp.com:8080 |
| HTTPS Proxy | Proxy URL for HTTPS requests (uses HTTP Proxy as fallback if not set) | http://proxy.corp.com:8080 |
| No Proxy | Comma-separated list of hosts/domains to bypass | localhost,127.0.0.1,.internal.com |
~/.craft-agent/config.json under the networkProxy key:
How It Works
When proxy is enabled, Craft Agents routes traffic at two levels:-
Node.js (main process) — All
fetch()calls (OAuth flows, MCP server connections, API requests) are routed through an undiciProxyAgentthat uses HTTPS CONNECT tunneling for secure connections. -
Electron (browser windows) — Browser pane requests and OAuth browser windows use Chromium’s built-in proxy support via
session.setProxy(). -
SDK subprocesses — The Claude Code subprocess receives
HTTP_PROXY,HTTPS_PROXY, andNO_PROXYenvironment variables automatically.
Proxy Authentication
For proxies that require authentication, include credentials in the URL:No Proxy Rules
The No Proxy field accepts a comma-separated list of bypass rules:| Pattern | Matches |
|---|---|
* | All hosts (effectively disables proxy) |
example.com | Exact hostname |
.example.com | All subdomains of example.com |
example.com:8080 | Specific host and port |
192.168.1.1 | Exact IP address |
[::1] | IPv6 address |
[::1]:8080 | IPv6 address with port |
localhost and 127.0.0.1 are not automatically bypassed. If your setup requires direct access to local services (e.g., local MCP servers), add them to the No Proxy list explicitly.TLS-Intercepting Proxies (Corporate Firewalls)
Many corporate proxies perform TLS inspection by re-signing HTTPS traffic with an internal Certificate Authority (CA). This causesfetch failed errors because Node.js does not trust the proxy’s CA by default.
Symptoms
- OAuth sign-in fails with “fetch failed” or returns silently with no browser window
- MCP server connections fail behind the corporate network but work on personal networks
- Browser pane requests work fine (Chromium uses the system certificate store) but agent-initiated requests fail
Solution
Set theNODE_EXTRA_CA_CERTS environment variable to point to your corporate proxy’s CA certificate before launching Craft Agents:
- macOS
- Windows
- Linux
One-time launch from terminal:Permanent (all apps, including Dock/Spotlight launches):Shell profile variables (Then relaunch Craft Agents. To verify it took effect:To remove it later:
~/.zshrc) only apply to terminal sessions. To set environment variables for packaged apps launched from Dock or Spotlight, use launchctl:On macOS 10.10+
launchctl setenv persists across reboots for GUI sessions. If your organisation uses an MDM, your IT department can also deploy this via a LaunchAgent plist:Obtaining the CA Certificate
Your IT department should provide the corporate proxy CA certificate. If you need to extract it yourself:The certificate must be in PEM format (begins with
-----BEGIN CERTIFICATE-----). If you receive a .cer or .der file, convert it:Troubleshooting
”Fetch failed” on OAuth sign-in
This typically indicates a TLS-intercepting proxy. See the TLS-Intercepting Proxies section above.Proxy works for browsing but not for OAuth
The browser pane uses Chromium’s certificate store (which includes system-installed CAs), while OAuth discovery and token exchange use Node.jsfetch() (which only trusts Node’s built-in CA bundle). Set NODE_EXTRA_CA_CERTS to bridge this gap.
MCP servers fail to connect
Ensure the MCP server’s hostname is not in the No Proxy list (unless you want direct access). For local MCP servers (stdio transport), proxy settings do not apply — they run as local subprocesses.Proxy authentication fails
- Verify credentials work with
curl:curl -v --proxy http://user:pass@proxy:8080 https://api.anthropic.com - URL-encode special characters in the password (e.g.,
p%40ssforp@ss) - Some corporate proxies use NTLM authentication, which is not supported directly. Consider using cntlm as a local NTLM-to-Basic proxy bridge.
Verifying proxy is active
Check the application log for proxy configuration at startup:~/Library/Logs/@craft-agent/electron/main.log (macOS)