Claude Cracks Open a Gym App's Hidden API—And Builds Your Export Tool
Stuck with workout data trapped in a slick gym app? One dev let Claude loose with mitmproxy. It didn't just sniff the API—it reverse-engineered, coded a CLI, and started coaching lifts.
theAIcatchupApr 08, 20263 min read
⚡ Key Takeaways
Claude uses mitmproxy to fully reverse-engineer Liftoff's tRPC API without human packet reading.𝕏
The resulting Go CLI exports workouts, stats, and trends—installable via Homebrew.𝕏
AI loops back: extracts data, then coaches training, hinting at agentic future for personal data.𝕏
The 60-Second TL;DR
Claude uses mitmproxy to fully reverse-engineer Liftoff's tRPC API without human packet reading.
The resulting Go CLI exports workouts, stats, and trends—installable via Homebrew.
AI loops back: extracts data, then coaches training, hinting at agentic future for personal data.