Documentation Index
Fetch the complete documentation index at: https://docs.velatir.com/llms.txt
Use this file to discover all available pages before exploring further.
Overview
The Velatir desktop client is built from three cooperating components and a transparent proxy. Each component has a single responsibility, which keeps the surface predictable and the failure modes recoverable.| Component | Responsibility |
|---|---|
| Host | Runs the MITM proxy, parses AI traffic, and submits traces. |
| Agent | Background supervisor. Keeps the host alive and pulls updates. |
| Watchdog | The supervisor loop inside the agent. Restarts the host and cleans up networking state if anything goes wrong. |
| Transparent proxy | Operating-system-level traffic capture. Different mechanism per platform. |
Traffic Interception
The desktop client intercepts outbound HTTPS traffic on the user’s machine, decrypts only the traffic that belongs to supported AI applications, and lets everything else pass through untouched.macOS
On macOS, traffic interception uses Apple’sNETransparentProxyProvider system extension.
- The system extension intercepts TCP flows at the network layer.
- Flows are relayed to the host process over a local Unix socket.
- The host runs an embedded MITM proxy that performs TLS interception on AI hosts only.
- The host re-establishes the upstream TLS connection and forwards traffic transparently.
Windows
On Windows, traffic interception uses a virtual network adapter.- A Wintun TUN adapter captures outbound TCP traffic on port 443.
- A bundled tun2socks helper forwards packets to the local MITM proxy.
- A firewall rule blocks outbound UDP on port 443. This forces clients to use HTTPS over TCP rather than QUIC, so traffic remains observable.
- The host process performs TLS interception on AI hosts only.
Apps-Only Mode
Decrypting every TLS connection on a managed device would be intrusive and risky. The desktop client therefore operates in apps-only mode: it only decrypts traffic that matches a known AI application. For each connection, the proxy:- Reads the SNI hostname from the TLS ClientHello.
- Resolves the source process and matches it against the application registry.
- If the process, hostname, and request path all match a known descriptor, the connection is decrypted and parsed.
- If anything is unmatched, the connection is blind-relayed without decryption.
The Velatir Agent
The agent is a long-running background process that owns two responsibilities: keeping the host alive and applying updates. On Windows, the agent runs asVelatirAgent.exe, installed by the MSI and registered to start at user logon. On macOS, it runs as part of the installed application bundle.
The agent itself never touches network state. Its only job is to make sure the host is running and current.
Bootstrap and Payload Layout
The MSI on Windows and the installer package on macOS are intentionally small. They install the agent and a public certificate, then hand off.- The installer launches the agent in
--bootstrapmode. - The agent downloads the current desktop-app payload (the host, parsers, and platform binaries) from Velatir’s distribution storage.
- The payload is staged into a versioned folder, and a
currentsymlink points at it. - New versions are staged side-by-side and swapped atomically. The previous version stays on disk until the next update completes successfully.
The Watchdog
The watchdog is the supervisor loop inside the agent. It runs every 30 seconds and exists to keep the system in a known-good state.| Check | Action |
|---|---|
| Host process is not running, but the host binary exists. | Relaunch the host immediately. |
| The transparent proxy is active, but the host process has gone away. | Tear down the proxy networking so the device does not lose internet access. |
| A new payload has been staged. | Drain the running host and relaunch it on the new version. |
Auto-Update
The agent polls for new versions every four hours. When a new payload is available it stages the new version, drains the running host, swaps thecurrent symlink, and relaunches.
Users can force an update from the CLI:
Certificate Handling
Because the desktop client performs TLS interception on AI traffic, applications must trust the certificate that the local proxy presents.- Windows. The Velatir CA certificate is added to
LocalMachine\Rootby the installer. If group policy blocks machine-wide installation, it falls back toCurrentUser\Rootfor the installing user. - macOS. The Velatir CA is added to the System keychain by the installer.
- Node.js, Python, and other runtimes that maintain their own trust stores may need additional configuration. See Troubleshooting for the common cases.
Next Steps
Permissions
What the operating system asks for and why.
VPN compatibility
How the desktop client behaves alongside corporate VPNs.
CLI reference
Control the agent, host, and updates from the command line.
Troubleshooting
Diagnose interception, certificate, and update issues.