At the same time, we also need to consider the security risk brought by the website decryption function. For example, when setting up a MITM proxy, ensure that the CA certificate is stored safely to avoid being misused. Also remind users that intercepting encrypted traffic may be monitored or blocked by websites, such as HSTS policies that prevent the use of unsecure certificates.