AI browser automation - navigate, click, type, extract content, and run autonomous web tasks
AI browser automation - navigate, click, type, extract content, and run autonomous web tasks
Is it safe?
No known CVEs for browser-use. 1 previously resolved.
No authentication — any process on your machine can connect to this server.
License not specified.
Last scanned 0 days ago.
Is it maintained?
Last commit 184 days ago.
Will it work with my client?
Transport: stdio, sse, http. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
How much context will it use?
0 tools. Token cost not measured.
What if it doesn't work?
Common issues: JSON syntax errors in config, Python version mismatch, network or firewall blocking. covers troubleshooting.
{
"mcpServers": {
"browser-use": {
"env": {
"OPENAI_API_KEY": "sk-..."
},
"args": [
"browser-use[cli]",
"--mcp"
],
"command": "uvx"
}
}
}Run this in your terminal to verify the server starts. Then let us know if it worked — your result helps other developers.
uvx browser-use 2>&1 | head -1 && echo "✓ Server started successfully"
After testing, let us know if it worked:
Last scanned 5h ago
No open vulnerabilities. 1 fixed CVE.
CVE-2025-47241FixedBrowser Use allows bypassing `allowed_domains` by putting a decoy domain in http auth username portion of a URL
### Summary During a manual source code review, [**ARIMLABS.AI**](https://arimlabs.ai) researchers identified that the `browser_use` module includes an embedded whitelist functionality to restrict URLs that can be visited. This restriction is enforced during agent initialization. However, it was discovered that these measures can be bypassed, leading to severe security implications. ### Details **File:** `browser_use/browser/context.py` The `BrowserContextConfig` class defines an `allo
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.