This document summarizes the risks of SSL/TLS interception proxies, which act as a "man in the middle" to inspect encrypted traffic. It discusses how interception proxies establish two separate SSL sessions and generate their own certificates, creating "transitive trust" where the client trusts the proxy's validation of the server. This can expose clients to risks from expired, revoked, self-signed or untrusted root certificates accepted by the proxy but not the client. The document also notes increased legal exposure, threat surface, and potential for weaker encryption when using an interception proxy.