nmhjklnm

nmhjklnm / cac

Public

Claude Code Cloak — 保护本地设备隐私,安全使用 Claude Code

56
7
69% credibility
Found Mar 21, 2026 at 56 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Shell
AI Summary

cac is a privacy wrapper for the Claude Code CLI tool that spoofs device identifiers and routes traffic through user-provided proxies to isolate real fingerprints.

How It Works

1
📰 Hear about cac

You learn about cac, a helpful shield that keeps your personal device details hidden while using your AI coding helper Claude Code.

2
📥 Get it set up

You run a simple one-click installer that prepares everything in your home folder, ready for your private use.

3
🔧 Prepare your shield

You tell it where your real Claude Code helper is, and it creates fake identities to protect your real ones.

4
🌐 Connect a private path

You add a secure tunnel connection, like a private pathway through the internet, to hide where you really are.

5
🔄 Switch to private mode

You pick your private identity, and it refreshes all the hidden details to match your chosen disguise.

6
Check it's working

You peek to confirm your tunnel is connected and your fake details are active, feeling safe and secure.

🎉 Chat privately

Now when you start Claude Code, everything flows through your private shield, keeping your real info completely hidden while you code and create.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 56 to 56 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is cac?

cac is a Bash script wrapper for the Claude Code CLI that spoofs your device's fingerprints—like hardware UUID, hostname, MAC address, timezone, and language—while injecting HTTP, HTTPS, or SOCKS5 proxies directly into claude processes. It solves privacy leaks in Claude Code CLI sessions, where the tool reports real device IDs and IPs to Anthropic, letting you run isolated profiles without local proxy apps like Clash. Install via curl script, add profiles with `cac add name host:port:user:pass`, switch with `cac name`, and run `claude` as usual.

Why is it gaining traction?

Unlike system-wide proxies or VPNs, cac works per-profile at the process level—no TUN mode conflicts, no local servers, and pre-launch checks block real IP leaks. Developers dig the clean residential IP exits for consistent Claude code CLI behavior across sessions, plus telemetry disable and auto locale matching. On ai cac github, its 56 stars reflect niche appeal for claude code privacy amid rising AI tracking concerns.

Who should use this?

Privacy-focused AI devs running Claude Code CLI for claude code skills testing across accounts, or those needing region-locked access without cache leeren hassles on cachyos Linux or macOS. Ideal for backend engineers evading rate limits via static proxies, not casual claude code free users okay with default telemetry.

Verdict

Grab cac if Claude Code CLI fingerprinting bugs you—solid bilingual docs and one-liner claude code install make it dead simple, but 56 stars and 0.7% credibility score scream early alpha; test in a VM first before production workflows. Worth watching as claude code pricing evolves.

(187 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.