Click links you wouldn't.
Your agent finds a sketchy GitHub repo, a stranger's API, a freshly-published MCP server. Let it click. The proxy holds the wire so you can look before bytes move.
single binary
trollbridge is an HTTP proxy that gates every request your agents make — by policy, by you, or by an LLM. So you can let your agents go places you wouldn't go yourself.
curl -fsSL https://trollbridge.dev/install.sh | bash
Your agent finds a sketchy GitHub repo, a stranger's API, a freshly-published MCP server. Let it click. The proxy holds the wire so you can look before bytes move.
Experimental servers get the same treatment as production endpoints. Approve once with a keystroke; make the next one sticky and it never asks again.
Held requests wait until you come back. Sticky approvals and policy rules clear the queue while you sleep; the rest is still there in the morning.
Inline allow/deny lists handle the obvious cases at the wire. api.openai.com allowed, *.suspicious.tld denied — decided before the request reaches the network.
Anything policy doesn't cover gets held. Approve or deny with a keystroke in the operator UI. Sticky decisions become new policy without you editing a file.
When "is this domain ok?" needs judgment, an LLM advisor reads the request and recommends allow or deny. You stay in the loop with less friction.
curl -fsSL https://trollbridge.dev/install.sh | bash
User-mode install to ~/.local/bin. No sudo, no system files.
trollbridge quickstart
eval "$(trollbridge env)"
Starts the proxy on 127.0.0.1:8080 and exports HTTP_PROXY / HTTPS_PROXY for the current shell. Works with any HTTP client.
Each held request appears in the operator UI. Approve once or make it sticky. Tail the audit log for a record of every decision.
curl -fsSL https://trollbridge.dev/install.sh | bash
Installs to ~/.local/bin/trollbridge. Verifies SHA256 against the GitHub release. Run install.sh --uninstall to remove.