Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.velatir.com/llms.txt

Use this file to discover all available pages before exploring further.

Overview

The Velatir desktop client needs a small set of operating system permissions to intercept and inspect AI traffic on a managed device. Every permission is requested at install time and is documented below so administrators can review exactly what the app does and why. The desktop client never requests permissions it does not need. There is no microphone access, no camera access, no location access, and no full disk access requirement.

Windows

The Windows installer requests administrator elevation once. From that single elevation it performs four discrete operations.
The MSI installer requires administrator rights because the operations that follow each need elevated privileges. Without elevation the installer cannot register the Wintun driver, install the trusted root certificate, or create a logon scheduled task.The CLI also requires administrator rights for commands that change traffic interception or configuration. See CLI reference for which commands require elevation.
The desktop client uses the Wintun TUN adapter to capture outbound TCP traffic at the kernel level. The Wintun driver is signed by its upstream maintainer (WireGuard) and is bundled with the installer for both x64 and arm64.On modern Windows builds the driver loads on demand. Administrator rights are required at install time to register it with the operating system.Wintun is widely deployed and is the same adapter used by WireGuard. The desktop client does not modify Wintun’s source or behaviour.
The installer adds the Velatir CA certificate to the LocalMachine\Root trusted root store. This certificate authority is used only by the local MITM proxy to terminate TLS for supported AI applications.If group policy or another system constraint prevents writing to LocalMachine\Root, the installer falls back to CurrentUser\Root for the installing account. Other users on the device will not see the desktop client until the certificate is also trusted in their context.For organisations that operate their own internal certificate authority, see Bring Your Own Certificate.
The installer creates a scheduled task named Velatir that starts the agent at user logon with the HIGHEST run level. This is how the watchdog can keep the host alive across user sessions without running as a Windows service.The task runs only when a user is logged on. The desktop client does not run in Session 0.

What Windows Will Prompt For

PromptWhenWhat it grants
User Account Control (UAC)At installAdministrator rights for the MSI session
SmartScreen warningFirst time a new MSI version is seenOne-time bypass to run the signed installer
UAC for CLI write commandsWhen running velatir start, stop, set-api-key, etc.Per-command elevation for state-changing operations

macOS

On macOS the desktop client uses Apple’s supported NETransparentProxyProvider system extension. There is no kernel extension and no patching of system frameworks.
The installer package asks for an administrator password once. This is the standard macOS installer flow.Administrator rights are also required for CLI commands that change interception or configuration. See CLI reference for the full list.
Velatir ships its network extension as a system extension signed with Velatir’s Apple Developer ID and notarised by Apple.On first run, macOS prompts the user to approve the extension in System Settings > General > Login Items & Extensions > Network Extensions. Until approval is granted, traffic interception cannot start.The Velatir entitlements are:
  • com.apple.developer.networking.networkextension with the app-proxy-provider-systemextension capability
  • com.apple.developer.system-extension.install
These are the entitlements Apple specifies for transparent proxy extensions. They do not grant access to filesystem content, user data, or any other system resource.Approve the Velatir system extension in System Settings
The system extension activates a NETransparentProxyManager configuration so the operating system routes outbound TCP flows through the Velatir extension. macOS records this configuration under Network Extensions in System Settings and surfaces it to the user.The capability is granted to the Velatir bundle identifier only. Uninstalling Velatir removes the configuration.
The installer adds the Velatir CA certificate to the System keychain (/Library/Keychains/System.keychain). This certificate is trusted by Safari, Chrome, Edge, and any other application that uses the macOS trust store.Some applications maintain their own trust stores and do not consult the System keychain. See Troubleshooting for the common cases (Node.js, Python, JVM).For organisations that operate their own internal certificate authority, see Bring Your Own Certificate.

What macOS Will Prompt For

PromptWhenWhat it grants
Administrator passwordAt installPermission to run the installer package
System Extension approvalFirst runPermission to load the Velatir network extension
Authorisation prompt for CLI write commandsWhen running velatir start, stop, set-api-key, etc.Per-command elevation for state-changing operations

What the Desktop Client Does Not Do

To make the trust boundary explicit:
  • The desktop client does not request Full Disk Access.
  • It does not read user files, browser history, keychain entries, or clipboard contents.
  • It does not capture screenshots or keystrokes.
  • It does not modify the operating system kernel. macOS uses a system extension and Windows uses a userspace TUN adapter.
  • It does not intercept traffic from applications that are not in the supported application list. All other traffic passes through without TLS decryption.
If your AI usage is captured under Data Protection, what gets stored in Velatir is governed by your agent configuration and Data Privacy, not by what the desktop client can technically observe.

Next Steps

VPN compatibility

How the desktop client behaves alongside corporate VPNs.

Enterprise deployment

Silent install, bring-your-own CA, and MDM rollouts.

Data privacy

What Velatir stores and how it scrubs sensitive content.

Troubleshooting

Diagnose certificate and approval issues.