Quickstart: Transparent Proxy
This guide gets the transparent proxy running on your machine. Once enabled, all HTTP/HTTPS traffic from the agent user is automatically scanned for prompt injection before it reaches the agent.
Prerequisites
- Linux (iptables or nftables) or macOS (pf)
- Root/sudo access for firewall rule setup
- Keyring (Linux only): gnome-keyring, KWallet, or pass — used for wallet key storage
Install and Enable
-
Install the CLI
Terminal window curl -fsSL https://getstronghold.xyz/install.sh | shThis downloads the
strongholdbinary for your platform and places it on yourPATH. -
Check system compatibility
Terminal window stronghold doctorDoctor verifies that your system has the required dependencies (firewall backend, kernel modules) and reports any issues.
-
Initialize Stronghold
Terminal window sudo stronghold initThis performs first-time setup:
- System check and account setup
- Wallet creation and API registration
- Creates the dedicated system user (
stronghold/_stronghold) - Installs proxy and CLI binaries
- Generates and installs a MITM CA certificate into the system trust store
- Configures and starts the proxy service
- Enables transparent proxying (firewall rules)
After
initcompletes, the proxy is already running. You do not need to runstronghold enableafter a fresh install. -
Re-enable the proxy (after disabling)
If you previously ran
stronghold disable, you can re-enable the proxy without repeating the full init:Terminal window sudo stronghold enableThis restarts the proxy process and reinstalls the firewall rules.
-
Verify it is running
Terminal window stronghold statusYou should see the proxy status as
enabledwith the firewall rules active.
Post-Setup Checks
Health check — verify connectivity to the Stronghold API and blockchain RPCs:
stronghold healthAccount balance — check your current balance and wallet address:
stronghold account balanceIf your balance is zero, you will need to fund your wallet before the proxy can process requests. See Funding Your Account for options.
What Happens Next
With the proxy enabled, any process running as the stronghold / _stronghold user has its outbound HTTP/HTTPS traffic intercepted:
- The request is forwarded to the destination server by the proxy.
- The response content is scanned by the Stronghold API.
- If the scan returns
ALLOW, the response is passed through to the agent unchanged. - If the scan returns
WARN, the response is passed through with warning headers attached. - If the scan returns
BLOCK, the response is replaced with a block notice and the original content is never delivered to the agent.
The proxy adds X-Stronghold-* headers to every proxied response. See Response Headers for details.
Next Steps
- Proxy Configuration — customize thresholds, allowlists, and behavior
- Enable & Disable — manage the proxy lifecycle
- Core Concepts — understand decisions, scores, and threat categories