As shown in the above picture, I have set up a local proxy server in cursor, which is implemented using Python’s mitmproxy framework. The certificate has also been set up normally, but it still reports Client TLS handshake failed. The client disconnected during the handshake. If this happens consistently for api2.cursor.sh, this may indicate that the client does not trust the proxy’s certificate.
This error?
Has anyone else encountered this problem before?
Hey there,
@Yoongool have you tried 127.0.0.1:8080? the api2.cursor.sh. does not accept mitmproxy framework due to certain certificate issues with Cursor integration and endpoints in general.