STATUS: Work In Progress - NOT WORKING
A MITM proxy experiment to intercept Google Antigravity IDE API calls and use your own Gemini API token.
This project does not work with the current version of Antigravity.
-
Antigravity doesn't use the public Gemini endpoint (
generativelanguage.googleapis.com) -
It uses an internal Google endpoint:
https://daily-cloudcode-pa.sandbox.googleapis.com/v1internal:streamGenerateContent?alt=sse -
The connection flow is more complex - there's a handshake followed by a socket-based/TLS flow, so a basic proxy setup won't reliably intercept the traffic.
- MITM proxy with mitmproxy
- HTTP_PROXY/HTTPS_PROXY environment variables
- DNS-level interception via /etc/hosts
- Binary patching of the language server
None of these approaches successfully intercept and modify the API requests.
This repo contains the experimental code and documentation from the investigation:
mitmproxy-addon.py- The proxy addon (works for standard googleapis.com, not Antigravity's internal endpoint)docs/- Documentation from the investigationscripts/- Helper scripts
PRs welcome if someone wants to investigate further. Key areas to explore:
- How does Antigravity establish the connection to
daily-cloudcode-pa.sandbox.googleapis.com? - Is there certificate pinning involved?
- Can the binary be patched to use a different endpoint?
MIT License - see LICENSE
This project is for educational and research purposes only. Ensure compliance with: