cac  by nmhjklnm

Isolate and protect your Claude Code interactions

Created 3 weeks ago

New!

345 stars

Top 80.4% on SourcePulse

GitHubView on GitHub
Project Summary

Summary

Claude Code (cac) addresses the need for isolated, protected, and managed Claude Code environments. It targets users requiring version control, distinct configurations, and enhanced privacy for their Claude interactions, offering a robust solution for running Claude Code securely and flexibly.

How It Works

cac functions as a process-level wrapper, intercepting Claude Code execution without source code modification. It manages distinct Claude Code versions, isolates .claude configuration directories, and employs Node.js hooks and shell shims to spoof hardware UUIDs, hostnames, and MAC addresses. Advanced privacy features include telemetry blocking via DNS guards and fetch interception, with configurable modes, and mTLS client certificate injection for secure communication.

Quick Start & Requirements

  • Installation: npm install -g claude-cac or via a provided installation script.
  • Prerequisites: Node.js (via npm).
  • Setup: Zero-configuration, auto-initializes on first use. Requires an initial /login command for OAuth authorization.
  • Documentation: Docs.

Highlighted Details

  • Environment Isolation: Each environment maintains separate Claude Code versions, .claude configurations (sessions, settings, memory), unique identities (UUID, hostname, MAC), and independent proxy routing.
  • Privacy Features: Implements device fingerprint spoofing, graded telemetry blocking (conservative/aggressive), and mTLS client certificate support.
  • Version Management: Allows installation, switching, pinning, and uninstallation of specific Claude Code versions per environment.
  • Docker Support: Offers a fully isolated Docker container mode with TUN networking and pre-installed Claude Code.

Maintenance & Community

Licensing & Compatibility

  • License: MIT License.
  • Compatibility: Permissive MIT license suitable for commercial use and integration into closed-source projects.

Limitations & Caveats

cac provides device-level privacy but explicitly states it cannot prevent account-level bans, which stem from OAuth, payment methods, or IP reputation. Users are advised to disable local proxy/VPN tools due to experimental TUN mode compatibility. System-wide IPv6 should be disabled to prevent address leaks.

Health Check
Last Commit

1 week ago

Responsiveness

Inactive

Pull Requests (30d)
33
Issues (30d)
34
Star History
348 stars in the last 23 days

Explore Similar Projects

Feedback? Help us improve.