GitHub Proxy for Autonomous Coding Agents
Issue scoped, auditable tokens to coding agents. Agents interact with GitHub
through the proxy using opaque ghx_-prefixed tokens — they never see real
GitHub credentials.
- Agents use standard
ghCLI, GitHub SDKs, or raw HTTP — no custom clients - Repository and permission scopes enforced at the proxy
- Full audit trail of every proxied request
- Single static Go binary, self-hosted for your team
Your administrator has already deployed ghp and configured DNS so that
api.github.com and github.com resolve to the proxy on your network.
You just need a token.
- Open your team's ghp dashboard (e.g.
https://ghp.example.com) - Sign in with GitHub
- Click Create Token, choose a repository and scopes
- Copy the
ghx_-prefixed token
ghp auth login
ghp token create --repo owner/repo --scope contents:read,pulls:writeexport GH_TOKEN=ghx_...The agent now uses GitHub through the proxy with scoped permissions. No other
configuration is needed — standard gh CLI, GitHub SDKs, and raw HTTP all
work transparently.
| Topic | Link |
|---|---|
| How it works | Architecture & virtualhost routing |
| Server setup | Installation & deployment |
| Configuration | Full reference |
| CLI reference | All commands |
| Web UI | Dashboard & admin panel |
| Development | Contributing & dev mode |
Tip: Run
mkdocs servefrom the repository root to browse the full documentation site locally.
