Running secator w host_recon <TARGET> -proxy auto will result in the following behavior:
naabu supports Socks5 / HTTP proxy, but not proxychains, so it will use the first available SOCKS5 / HTTP proxy.
nmap supports proxy through proxychains4 but has no good support for proxychains, HTTP or Socks5 proxy, so it will use proxychains4 for the execution.
...
HTTP
You can pass an HTTP proxy to a task / workflow / scan by using -proxy http://<PROXY_IP>:<PROXY_PORT>.
Socks5
You can pass a SOCKS5 proxy to a task / workflow / scan by using -proxy socks5://<PROXY_IP>:<PROXY_PORT>.
Proxychains
You can pass -proxy proxychains to a task / workflow / scan by using -proxy proxychains. Remember to configure your /etc/proxychains.conf in that configuration, and test it prior to running secator tasks.