/ Каталог / Песочница / stealth-browser-mcp
● Сообщество vibheksoni ⚡ Сразу

stealth-browser-mcp

автор vibheksoni · vibheksoni/stealth-browser-mcp

90-tool MCP browser automation that bypasses anti-bot systems — network hooks, UI cloning, and CDP control via natural language.

stealth-browser-mcp is an MCP server for undetectable browser automation using nodriver and Chrome DevTools Protocol. It provides 90 tools across 11 categories: browser management, element interaction, pixel-perfect UI cloning, network debugging with dynamic hooks, CDP functions, progressive cloning, cookies/storage, tabs, and page analysis. Bypasses Cloudflare and similar protections. Works with Claude, Cursor, and other MCP clients.

Зачем использовать

Ключевые функции

Живое демо

Как выглядит на практике

stealth-browser-mcp.replay ▶ готово
0/0

Установка

Выберите клиент

~/Library/Application Support/Claude/claude_desktop_config.json  · Windows: %APPDATA%\Claude\claude_desktop_config.json
{
  "mcpServers": {
    "stealth-browser-mcp": {
      "command": "TODO",
      "args": [
        "See README: https://github.com/vibheksoni/stealth-browser-mcp"
      ]
    }
  }
}

Откройте Claude Desktop → Settings → Developer → Edit Config. Перезапустите после сохранения.

~/.cursor/mcp.json · .cursor/mcp.json
{
  "mcpServers": {
    "stealth-browser-mcp": {
      "command": "TODO",
      "args": [
        "See README: https://github.com/vibheksoni/stealth-browser-mcp"
      ]
    }
  }
}

Cursor использует ту же схему mcpServers, что и Claude Desktop. Конфиг проекта приоритетнее глобального.

VS Code → Cline → MCP Servers → Edit
{
  "mcpServers": {
    "stealth-browser-mcp": {
      "command": "TODO",
      "args": [
        "See README: https://github.com/vibheksoni/stealth-browser-mcp"
      ]
    }
  }
}

Щёлкните значок MCP Servers на боковой панели Cline, затем "Edit Configuration".

~/.codeium/windsurf/mcp_config.json
{
  "mcpServers": {
    "stealth-browser-mcp": {
      "command": "TODO",
      "args": [
        "See README: https://github.com/vibheksoni/stealth-browser-mcp"
      ]
    }
  }
}

Тот же формат, что и Claude Desktop. Перезапустите Windsurf для применения.

~/.continue/config.json
{
  "mcpServers": [
    {
      "name": "stealth-browser-mcp",
      "command": "TODO",
      "args": [
        "See README: https://github.com/vibheksoni/stealth-browser-mcp"
      ]
    }
  ]
}

Continue использует массив объектов серверов, а не map.

~/.config/zed/settings.json
{
  "context_servers": {
    "stealth-browser-mcp": {
      "command": {
        "path": "TODO",
        "args": [
          "See README: https://github.com/vibheksoni/stealth-browser-mcp"
        ]
      }
    }
  }
}

Добавьте в context_servers. Zed перезагружается автоматически.

claude mcp add stealth-browser-mcp -- TODO 'See README: https://github.com/vibheksoni/stealth-browser-mcp'

Однострочная команда. Проверить: claude mcp list. Удалить: claude mcp remove.

Сценарии использования

Реальные сценарии: stealth-browser-mcp

How to scrape data from a Cloudflare-protected site for authorized research

👤 Researchers and data analysts who need data from protected sites they have permission to access ⏱ ~15 min intermediate

Когда использовать: You need to extract data from a site you're authorized to access but standard scraping tools get blocked.

Предварительные требования
  • stealth-browser-mcp installed — Clone repo, pip install -r requirements.txt
  • Authorization to access the target site — Ensure you have permission to scrape the site
Поток
  1. Navigate to the site
    Open a stealth browser and navigate to https://example.com/data. Wait for the page to fully load.✓ Скопировано
    → Page loaded successfully, bypassing protection
  2. Extract data
    Query all elements matching the product listing cards. Extract titles, prices, and URLs.✓ Скопировано
    → Structured data from the page

Итог: Data extracted from the protected site for authorized analysis.

Подводные камни
  • Running too many concurrent browsers — Keep to 1-2 browser instances at a time to avoid detection patterns
Сочетать с: filesystem

Clone a UI element pixel-perfect for design reference

👤 Frontend developers who want to study and replicate a UI pattern ⏱ ~10 min intermediate

Когда использовать: You see a UI component you like and want the complete HTML/CSS for reference.

Предварительные требования
  • stealth-browser-mcp running — Start the MCP server
Поток
  1. Navigate and identify
    Open https://example.com and take a screenshot. I want to clone the navigation header.✓ Скопировано
    → Screenshot with page rendered
  2. Clone the element
    Clone the nav header element completely — HTML structure, CSS styles, events, and animations. Save to a file.✓ Скопировано
    → Complete element clone saved with all styles and assets

Итог: A self-contained HTML/CSS clone of the UI element for reference.

Подводные камни
  • Cloned elements may depend on external fonts or scripts — Use extract_element_assets to also capture referenced resources
Сочетать с: filesystem

Комбинации

Сочетайте с другими MCP — эффект x10

stealth-browser-mcp + filesystem

Save scraped data and cloned UI elements to organized files

Scrape all product data from the page and save it as JSON to ~/data/products.json.✓ Скопировано

Инструменты

Что предоставляет этот MCP

ИнструментВходные данныеКогда вызыватьСтоимость
spawn_browser options?: obj Launch a new stealth browser instance 0
navigate url: str Navigate to a URL 0
query_elements selector: str Find elements by CSS selector 0
clone_element_complete selector: str Pixel-perfect clone of a DOM element with all styles 0
create_dynamic_hook hook_function: str Create a Python function to intercept network traffic 0
take_screenshot selector?: str Capture a screenshot of the page or specific element 0
execute_script script: str Execute JavaScript in the page context 0

Стоимость и лимиты

Во что обходится

Квота API
N/A — runs locally
Токенов на вызов
200–2000 tokens per tool call
Деньги
Free
Совет
Use core mode (22 tools) if your client struggles with the full 90-tool set.

Безопасность

Права, секреты, радиус поражения

Хранение учётных данных: No credentials stored by the server. If accessing authenticated sites, manage cookies via get/set_cookie tools.
Исходящий трафик: Connects to whatever URLs you navigate to via Chrome

Устранение неполадок

Частые ошибки и исправления

Chrome not found

The server uses nodriver which manages its own Chrome. Ensure Chrome is installed or let nodriver download it.

Проверить: which google-chrome || which chromium
Anti-bot detection still triggered

Try adding delays between actions, reduce concurrent requests, or use different browser profiles.

Проверить: Check the page for CAPTCHA or block messages
Element clone incomplete

Some elements use shadow DOM or iframe isolation. Use execute_cdp_command for low-level access.

Проверить: Inspect the element in DevTools to check for shadow roots

Альтернативы

stealth-browser-mcp в сравнении

АльтернативаКогда использоватьКомпромисс
playwright MCPYou don't need anti-bot bypass and want standard browser automationStandard Playwright with no stealth features but broader community support

Ещё

Ресурсы

📖 Читать официальный README на GitHub

🐙 Открытые задачи

🔍 Все 400+ MCP-серверов и Skills