ConceptsΒΆ

Understanding why ProxyWhirl works the way it does. These pages explain the design philosophy and architectural decisions behind the library.

Not API docs

These pages explain concepts and rationale. For class/method reference, see Reference. For step-by-step guides, see Guides.

Rotation Strategies

Why 9 strategies? How they compose. The Protocol + Registry design that makes strategies pluggable.

Rotation Strategies
Cache Architecture

The three-tier L1/L2/L3 cache hierarchy – why each tier exists, how promotion/demotion works, and credential encryption.

Cache Architecture
Circuit Breakers

How ProxyWhirl detects, isolates, and recovers from proxy failures using the circuit breaker state machine.

Circuit Breakers
Proxy Lifecycle

The complete journey of a proxy: fetch, validate, enrich, rotate, monitor, eject. Each stage and its responsibilities.

Proxy Lifecycle
Security Model

Credential handling, Fernet encryption, URL redaction, SSRF protection, and the defense-in-depth approach.

Security Model