ghproxy

ghproxy is a proxy service/tool intended to fetch content from GitHub through an alternate endpoint, typically to bypass direct access restrictions (e.g., CORS, corporate egress rules, or rate limiting) by relaying requests and returning GitHub responses.

Evaluated Apr 04, 2026 (27d ago)
Homepage ↗ Repo ↗ Infrastructure proxy github networking caching infrastructure http
⚙ Agent Friendliness
26
/ 100
Can an agent use this?
🔒 Security
40
/ 100
Is it safe for agents?
⚡ Reliability
25
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
0
Documentation
0
Error Messages
0
Auth Simplicity
60
Rate Limits
5

🔒 Security

TLS Enforcement
70
Auth Strength
20
Scope Granularity
10
Dep. Hygiene
50
Secret Handling
60

As a proxy, the main risks typically include SSRF/path traversal if URL targets are not tightly validated, cache poisoning if caching is enabled without proper keying, and misuse as an open proxy. TLS enforcement depends on deployment configuration; auth/scoping are unknown. Dependency hygiene and secret handling cannot be verified from the provided information.

⚡ Reliability

Uptime/SLA
0
Version Stability
40
Breaking Changes
30
Error Recovery
30
AF Security Reliability

Best When

You need reliable access to publicly available GitHub content from constrained networks or from browsers where direct GitHub requests are blocked.

Avoid When

You require cryptographic integrity verification of fetched content, fine-grained authZ, or strict compliance controls without implementing additional safeguards (e.g., allowlists, signature/hash verification).

Use Cases

  • Proxying GitHub resources from environments that cannot reach GitHub directly
  • Fetching raw files (e.g., READMEs, model assets, configuration files) via an alternate domain
  • Workarounds for browser CORS issues by routing through a same-origin proxy
  • Centralized caching/egress control for GitHub content in an internal network

Not For

  • Sensitive production workloads that require strong integrity guarantees without additional verification
  • Use as a general-purpose auth gateway to protect GitHub credentials (it typically should not be tasked with secrets)
  • Guaranteeing deterministic content versions without pinning (proxying alone may not provide integrity/pinning)

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
No
SDK
No
Webhooks
No

Authentication

OAuth: No Scopes: No

No explicit auth interface can be confirmed from the provided information. Many proxy tools accept requests without user auth or use simple configuration-based controls.

Pricing

Free tier: No
Requires CC: No

Pricing cannot be determined from the provided information (likely self-hosted/open-source proxy).

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • Proxy endpoints may require careful URL encoding and path handling to avoid incorrect upstream targets
  • Without explicit allowlists/validation, agents may inadvertently request unintended upstream resources
  • If implemented without caching or timeouts, long upstream fetches can lead to agent timeouts and inconsistent results
  • If rate limiting is not clearly documented, agents may trigger upstream throttling unpredictably

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for ghproxy.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-04-04.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered