Reconstructed from binary analysis, pipe interrogation, asar extraction • 2026-02-19
\\.\pipe\cowork-vm-servicesubscribeEvents — open to any callersmol-bin.x64.vhdx — 36 MBdefault.clod — 96 KB/mnt/.virtiofs-root → host share mount/var/run/mitm-proxy.sock/usr/local/share/ca-certificates/mitm-proxy-ca.crtsandbox-helper <uid> <gid> <cmd> [args...]/etc/srt-settings.base.json*.anthropic.com from inside the VM. Every API call — including Claude completions, auth tokens, and telemetry — is decrypted, inspectable, and re-encrypted before leaving the machine. This is by design: Anthropic can inject headers, observe prompts, enforce policy, or modify responses at the proxy layer.
[updater] compares old vs new file hashes. When catabolism.js was modified (breaking exeray-mcp.js), the updater detected drift from the original deployment hash and triggered restoration via the virtiofs mount — writing back through the guest-to-host share. Writer PID null in RDCX because the Go process exits before chokidar processes the notification.
addApprovedOauthToken. Tokens must be explicitly passed from claude.exe. The proxy logs: [proxy] added approved OAuth token (hash: %x...) on each addition.
VM not supported (win32/x64) — Hyper-V is either absent or disabled. The service runs with SYSTEM privileges and holds the pipe open but cannot start a VM. All VM-gated methods return auth errors from our probes. The subscribeEvents endpoint returns success:true then immediately closes — no active sessions.
dbde5d16768ed0c1) and validates every connection except subscribeEvents. Claude.exe is signed by Anthropic, PBC and passes. Node.js (OpenJS Foundation) fails. This prevents MCP servers or arbitrary local processes from controlling the VM — all VM operations must flow through the signed Electron binary.