npx claudepluginhub joshuarweaver/cascade-ai-ml-agents-misc-1 --plugin aradotso-trending-skills-37This skill uses the workspace's default tool permissions.
> Skill by [ara.so](https://ara.so) — Daily 2026 Skills collection.
Guides Next.js Cache Components and Partial Prerendering (PPR) with cacheComponents enabled. Implements 'use cache', cacheLife(), cacheTag(), revalidateTag(), static/dynamic optimization, and cache debugging.
Guides building MCP servers enabling LLMs to interact with external services via tools. Covers best practices, TypeScript/Node (MCP SDK), Python (FastMCP).
Generates original PNG/PDF visual art via design philosophy manifestos for posters, graphics, and static designs on user request.
Skill by ara.so — Daily 2026 Skills collection.
A Rust port of MasterHttpRelayVPN that routes traffic through a Google Apps Script relay, hiding the real destination from DPI/censorship systems. The ISP sees TLS SNI www.google.com; the actual request is proxied inside the encrypted tunnel through your own Google Apps Script deployment.
Browser → HTTP(8085)/SOCKS5(8086) → mhrv-rs → TLS to Google IP (SNI: www.google.com)
→ Google edge → Apps Script relay → real destination
Download from releases page:
mhrv-rs-linux-x86_64.tar.gzmhrv-rs-macos-aarch64.tar.gz or mhrv-rs-macos-x86_64.tar.gzmhrv-rs-windows-x86_64.zipmhrv-rs-android-universal-v*.apk# CLI only
cargo build --release
# CLI + desktop UI (egui)
cargo build --release --features ui
# Binaries output to:
# target/release/mhrv-rs (CLI)
# target/release/mhrv-rs-ui (Desktop UI)
Required for HTTPS interception. Run once with elevated privileges:
# macOS / Linux
sudo ./mhrv-rs --install-cert
# Windows (run as Administrator)
mhrv-rs.exe --install-cert
# Or use platform launchers (also starts the UI):
./run.command # macOS
./run.sh # Linux
run.bat # Windows
The CA keypair is generated locally (ca/ca.crt + ca/ca.key) and never leaves your machine.
~/Library/Application Support/mhrv-rs/config.json~/.config/mhrv-rs/config.json%APPDATA%\mhrv-rs\config.json./config.json (current directory)config.json{
"mode": "apps_script",
"script_id": "AKfycby...",
"auth_key": "$AUTH_KEY_FROM_CODE_GS",
"google_ip": "216.239.38.120",
"front_domain": "www.google.com",
"http_port": 8085,
"socks5_port": 8086
}
config.json with all options{
"mode": "apps_script",
"script_id": "AKfycby...,AKfycbz...",
"auth_key": "$YOUR_AUTH_KEY",
"google_ip": "216.239.38.120",
"front_domain": "www.google.com",
"http_port": 8085,
"socks5_port": 8086,
"hosts": {
"example.com": "direct"
},
"upstream_socks5": null
}
Key fields:
mode: "apps_script" (default) or "google_only" (no relay, Google domains only)script_id: Deployment ID from Google Apps Script. Comma-separate multiple for round-robin rotationauth_key: Secret matching AUTH_KEY in your Code.gsgoogle_ip: Google edge IP — 216.239.38.120 is a reliable defaultfront_domain: Keep as www.google.comhosts: Per-domain overrides — "direct" bypasses the relay entirelyupstream_socks5: Forward through an external SOCKS5 (e.g. "127.0.0.1:1080"){
"mode": "google_only",
"google_ip": "216.239.38.120",
"front_domain": "www.google.com",
"http_port": 8085,
"socks5_port": 8086
}
Use this to bootstrap — access script.google.com to deploy Code.gs when Google is blocked.
# Start proxy server (reads config.json)
mhrv-rs serve
# Start with explicit config file
mhrv-rs serve --config /path/to/config.json
# Test end-to-end relay connectivity
mhrv-rs test
# Test SNI fronting only (no config required beyond google_ip + front_domain)
mhrv-rs test-sni
# Scan for fastest Google IP from your network
mhrv-rs scan-ips
# Install MITM CA to system trust store
mhrv-rs --install-cert
# Show version
mhrv-rs --version
# Show help
mhrv-rs --help
Code.gsconst AUTH_KEY = "your-strong-secret-here";
AKfycby...)config.json as script_idSet browser proxy to 127.0.0.1:8085 (HTTP). Most browsers: Settings → Network → Manual proxy.
# Test with curl through the HTTP proxy
curl -x http://127.0.0.1:8085 https://example.com
# curl via SOCKS5
curl --socks5 127.0.0.1:8086 https://example.com
# Use with any SOCKS5-aware application
export ALL_PROXY=socks5://127.0.0.1:8086
{
"script_id": "AKfycby_first...,AKfycby_second...,AKfycby_third..."
}
Each Google Apps Script deployment has its own quota. Round-robin rotation spreads load.
{
"hosts": {
"internal.company.com": "direct",
"192.168.1.0/24": "direct"
}
}
{
"upstream_socks5": "127.0.0.1:10808"
}
# Run CLI in background
nohup mhrv-rs serve > mhrv-rs.log 2>&1 &
# Or with systemd
cat > /etc/systemd/system/mhrv-rs.service << 'EOF'
[Unit]
Description=MasterHttpRelayVPN-RUST
After=network.target
[Service]
ExecStart=/usr/local/bin/mhrv-rs serve
Restart=on-failure
User=nobody
WorkingDirectory=/etc/mhrv-rs
[Install]
WantedBy=multi-user.target
EOF
systemctl enable --now mhrv-rs
# Launch UI directly
./mhrv-rs-ui # Linux/macOS
mhrv-rs-ui.exe # Windows
UI features:
mhrv-rs-android-universal-v*.apktun2proxy to capture all device IP trafficAndroid HTTPS caveat: From Android 7+, apps must opt in to trust user CAs. Chrome and Firefox work; Telegram, WhatsApp, Instagram, etc. do not. For those apps:
127.0.0.1:1081google_only mode for Google services (no CA needed)upstream_socks5 to an external VPS# Check if mhrv-rs is running
ps aux | grep mhrv-rs
# Check ports are listening
ss -tlnp | grep -E '8085|8086' # Linux
netstat -an | grep -E '8085|8086' # macOS/Windows
# Try a different port if 8085 is taken
# Set http_port: 8181 in config.json
# CA not installed — run:
sudo mhrv-rs --install-cert
# Firefox: manually import ca/ca.crt
# Settings → Privacy & Security → Certificates → View Certificates → Authorities → Import
script_id entries (comma-separated) for rotationAUTH_KEY in Code.gs matches auth_key in config.jsonmhrv-rs scan-ips
Update google_ip in config with the fastest result.
Use google_only mode temporarily:
cp config.google-only.example.json config.json
mhrv-rs serve
# Set browser proxy to 127.0.0.1:8085
# Now open script.google.com in browser and deploy Code.gs
mhrv-rs test-sni
mhrv-rs test
# Or via curl:
curl -v -x http://127.0.0.1:8085 https://httpbin.org/ip
mhrv-rs/ # binary
mhrv-rs-ui/ # desktop UI binary
config.json # your config
ca/
ca.crt # MITM root cert (public, installed to system)
ca.key # MITM root key (private, stays local)
assets/
apps_script/
Code.gs # Apps Script relay source to deploy to Google