/ 目錄 / 演練場 / stealth-browser-mcp
● 社群 vibheksoni ⚡ 即開即用

stealth-browser-mcp

作者 vibheksoni · vibheksoni/stealth-browser-mcp

90-tool MCP browser automation that bypasses anti-bot systems — network hooks, UI cloning, and CDP control via natural language.

stealth-browser-mcp is an MCP server for undetectable browser automation using nodriver and Chrome DevTools Protocol. It provides 90 tools across 11 categories: browser management, element interaction, pixel-perfect UI cloning, network debugging with dynamic hooks, CDP functions, progressive cloning, cookies/storage, tabs, and page analysis. Bypasses Cloudflare and similar protections. Works with Claude, Cursor, and other MCP clients.

為什麼要用

核心特性

即時演示

實際使用效果

stealth-browser-mcp.replay ▶ 就緒
0/0

安裝

選擇你的客戶端

~/Library/Application Support/Claude/claude_desktop_config.json  · Windows: %APPDATA%\Claude\claude_desktop_config.json
{
  "mcpServers": {
    "stealth-browser-mcp": {
      "command": "TODO",
      "args": [
        "See README: https://github.com/vibheksoni/stealth-browser-mcp"
      ]
    }
  }
}

開啟 Claude Desktop → Settings → Developer → Edit Config。儲存後重啟應用。

~/.cursor/mcp.json · .cursor/mcp.json
{
  "mcpServers": {
    "stealth-browser-mcp": {
      "command": "TODO",
      "args": [
        "See README: https://github.com/vibheksoni/stealth-browser-mcp"
      ]
    }
  }
}

Cursor 使用與 Claude Desktop 相同的 mcpServers 格式。專案級設定優先於全域。

VS Code → Cline → MCP Servers → Edit
{
  "mcpServers": {
    "stealth-browser-mcp": {
      "command": "TODO",
      "args": [
        "See README: https://github.com/vibheksoni/stealth-browser-mcp"
      ]
    }
  }
}

點擊 Cline 側欄中的 MCP Servers 圖示,然後選 "Edit Configuration"。

~/.codeium/windsurf/mcp_config.json
{
  "mcpServers": {
    "stealth-browser-mcp": {
      "command": "TODO",
      "args": [
        "See README: https://github.com/vibheksoni/stealth-browser-mcp"
      ]
    }
  }
}

格式與 Claude Desktop 相同。重啟 Windsurf 生效。

~/.continue/config.json
{
  "mcpServers": [
    {
      "name": "stealth-browser-mcp",
      "command": "TODO",
      "args": [
        "See README: https://github.com/vibheksoni/stealth-browser-mcp"
      ]
    }
  ]
}

Continue 使用伺服器物件陣列,而非映射。

~/.config/zed/settings.json
{
  "context_servers": {
    "stealth-browser-mcp": {
      "command": {
        "path": "TODO",
        "args": [
          "See README: https://github.com/vibheksoni/stealth-browser-mcp"
        ]
      }
    }
  }
}

加入 context_servers。Zed 儲存後熱重載。

claude mcp add stealth-browser-mcp -- TODO 'See README: https://github.com/vibheksoni/stealth-browser-mcp'

一行命令搞定。用 claude mcp list 驗證,claude mcp remove 移除。

使用場景

實戰用法: stealth-browser-mcp

How to scrape data from a Cloudflare-protected site for authorized research

👤 Researchers and data analysts who need data from protected sites they have permission to access ⏱ ~15 min intermediate

何時使用: You need to extract data from a site you're authorized to access but standard scraping tools get blocked.

前置條件
  • stealth-browser-mcp installed — Clone repo, pip install -r requirements.txt
  • Authorization to access the target site — Ensure you have permission to scrape the site
步驟
  1. Navigate to the site
    Open a stealth browser and navigate to https://example.com/data. Wait for the page to fully load.✓ 已複製
    → Page loaded successfully, bypassing protection
  2. Extract data
    Query all elements matching the product listing cards. Extract titles, prices, and URLs.✓ 已複製
    → Structured data from the page

結果: Data extracted from the protected site for authorized analysis.

注意事項
  • Running too many concurrent browsers — Keep to 1-2 browser instances at a time to avoid detection patterns
搭配使用: filesystem

Clone a UI element pixel-perfect for design reference

👤 Frontend developers who want to study and replicate a UI pattern ⏱ ~10 min intermediate

何時使用: You see a UI component you like and want the complete HTML/CSS for reference.

前置條件
  • stealth-browser-mcp running — Start the MCP server
步驟
  1. Navigate and identify
    Open https://example.com and take a screenshot. I want to clone the navigation header.✓ 已複製
    → Screenshot with page rendered
  2. Clone the element
    Clone the nav header element completely — HTML structure, CSS styles, events, and animations. Save to a file.✓ 已複製
    → Complete element clone saved with all styles and assets

結果: A self-contained HTML/CSS clone of the UI element for reference.

注意事項
  • Cloned elements may depend on external fonts or scripts — Use extract_element_assets to also capture referenced resources
搭配使用: filesystem

組合

與其他 MCP 搭配,撬動十倍槓桿

stealth-browser-mcp + filesystem

Save scraped data and cloned UI elements to organized files

Scrape all product data from the page and save it as JSON to ~/data/products.json.✓ 已複製

工具

此 MCP 暴露的能力

工具輸入參數何時呼叫成本
spawn_browser options?: obj Launch a new stealth browser instance 0
navigate url: str Navigate to a URL 0
query_elements selector: str Find elements by CSS selector 0
clone_element_complete selector: str Pixel-perfect clone of a DOM element with all styles 0
create_dynamic_hook hook_function: str Create a Python function to intercept network traffic 0
take_screenshot selector?: str Capture a screenshot of the page or specific element 0
execute_script script: str Execute JavaScript in the page context 0

成本與限制

運行它的成本

API 配額
N/A — runs locally
每次呼叫 Token 數
200–2000 tokens per tool call
費用
Free
提示
Use core mode (22 tools) if your client struggles with the full 90-tool set.

安全

權限、密鑰、影響範圍

憑證儲存: No credentials stored by the server. If accessing authenticated sites, manage cookies via get/set_cookie tools.
資料出站: Connects to whatever URLs you navigate to via Chrome

故障排查

常見錯誤與修復

Chrome not found

The server uses nodriver which manages its own Chrome. Ensure Chrome is installed or let nodriver download it.

驗證: which google-chrome || which chromium
Anti-bot detection still triggered

Try adding delays between actions, reduce concurrent requests, or use different browser profiles.

驗證: Check the page for CAPTCHA or block messages
Element clone incomplete

Some elements use shadow DOM or iframe isolation. Use execute_cdp_command for low-level access.

驗證: Inspect the element in DevTools to check for shadow roots

替代方案

stealth-browser-mcp 對比其他方案

替代方案何時用它替代權衡
playwright MCPYou don't need anti-bot bypass and want standard browser automationStandard Playwright with no stealth features but broader community support

更多

資源

📖 閱讀 GitHub 上的官方 README

🐙 查看未解決的 issue

🔍 瀏覽全部 400+ MCP 伺服器和 Skills