Getting started¶
Install¶
curl -LsSf https://raw.githubusercontent.com/romain-gilliotte/spectral/main/install.sh | bash
This installs uv if needed, then installs Spectral in an isolated environment with spectral available in ~/.local/bin/.
Load the Chrome extension¶
- Open
chrome://extensions, enable Developer mode, click Load unpacked and select theextension/directory from the repository - Copy the extension ID shown on the card
- Connect the extension to the CLI:
spectral extension install --extension-id <paste-id-here>
Capture traffic¶
- Navigate to the web app you want to reverse-engineer
- Click the Spectral extension icon → Start Capture
- Browse the application — exercise the workflows you care about
- Click Stop & Send — the capture is sent to the CLI via native messaging and stored automatically
You can repeat this for multiple sessions; captures are merged during analysis.
Analyze¶
Generate MCP tools from the captured traffic:
spectral mcp analyze myapp
If the app requires authentication, generate a login script and authenticate:
spectral auth analyze myapp
spectral auth login myapp
Use in Claude¶
Install the MCP server into Claude Desktop and/or Claude Code:
spectral mcp install
This auto-detects installed clients and registers the server. Use --target claude-desktop or --target claude-code to install to a specific client only. See MCP tools for details.
The server exposes all discovered API endpoints as tools. Authentication is handled automatically using stored tokens.
Next steps¶
- Capture — Web for the full capture reference (GraphQL interception, what gets captured, SPA handling)
- Capture — Desktop and Mobile for non-browser traffic
- Authentication for all auth options (generated scripts, manual tokens, direct extraction)
- CLI reference for the complete command list