Stealth Chromium MCP server with hybrid AOM + Set-of-Mark vision and Readability extraction.
{
"mcpServers": {
"io-github-ykshah1309-stealth-agent-browser-mcp": {
"command": "<see-readme>",
"args": []
}
}
}No install config available. Check the server's README for setup instructions.
Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Stealth Chromium MCP server with hybrid AOM + Set-of-Mark vision and Readability extraction.
Is it safe?
No package registry to scan.
No authentication — any process on your machine can connect.
License not specified.
Is it maintained?
Last commit 0 days ago. 1 stars.
Will it work with my client?
Transport: stdio. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
A Model Context Protocol (MCP) server that gives AI agents a stealth-grade Chromium browser with a hybrid Accessibility-Object-Model + Set-of-Mark vision interface. Built for Claude, works with any MCP-compatible host.
rebrowser-playwright to patch the Runtime.Enable CDP leak that bypasses playwright-extra-class stealth plugins. Passes modern bot-detection suites (CreepJS, bot.sannysoft.com) where vanilla Playwright fails.browser_snapshot returns Playwright aria snapshot YAML (~2–5 KB) instead of raw HTML (100KB+). Every interactive element carries a [ref=eN] id that actions consume directly — no selectors, no drift.mode: "hybrid" and the server overlays numbered red boxes on the screenshot so the model can ground visually (Set-of-Mark prompting, Yang et al.). The ref ids on the image match the ids in the YAML. No parallel numbering scheme to go out of sync.browser_scroll_read runs Mozilla Readability through JSDOM and returns clean Markdown — optionally delta-only, so re-reads cost nothing when nothing changed.Authorized use only. Stealth tooling has legitimate applications (accessibility auditing, your-own-account automation, QA against sites you own or have permission to test). Do not use this server to violate a site's terms of service or applicable law. See SECURITY.md.
npm install -g stealth-agent-browser-mcp
# Chromium binary is fetched automatically on first launch
npx playwright-core install chromium
Or run without install via npx stealth-agent-browser-mcp.
Add to your MCP config:
{
"mcpServers": {
"stealth-browser": {
"command": "npx",
"args": ["-y", "stealth-agent-browser-mcp"],
"env": {
"SAB_HEADLESS": "true",
"SAB_STEALTH_LEVEL": "patched"
}
}
}
}
Restart the host. The agent will see the tools listed below.
| Tool | Purpose |
|---|---|
browser_navigate | Navigate a URL and return a snapshot. |
browser_snapshot | aom (YAML only, cheapest), vision (raw screenshot), or hybrid (YAML + Set-of-Mark screenshot). |
browser_click | Click an element by its [ref=eN]. |
browser_type | Type into an input/textarea by ref. |
browser_select | Choose options in a <select> by ref. |
browser_scroll_read | Scroll and return Readability Markdown (delta-only by default). |
browser_wait_for | Wait for text or a ref to become visible. |
browser_tabs | list / new / close / switch. |
browser_eval | Evaluate a JS expression in the page's MAIN world; JSON result. |
browser_set_proxy | Update single-proxy config (effective after browser_restart). |
browser_set_proxy_pool | Replace residential proxy pool at runtime (effective after browser_restart). |
browser_solve_captcha | Fallback captcha solver (CapSolver / 2Captcha). Detects Turnstile/hCaptcha/reCAPTCHA on the page. |
browser_restart | Close + re-open the active browser session with current config. |
All action tools are addressed by the ref emitted in the last AOM snapshot. Refs are Playwright's own aria-ref=eN ids — there is no parallel numbering scheme.
All via environment variables:
| Var | Default | Notes |
|---|---|---|
SAB_HEADLESS | true | false for a visible window (debugging). |
SAB_STEALTH_LEVEL | patched | off | patched | paranoid. |
SAB_PROXY_SERVER | — | Single-proxy mode. e.g. http://host:port |
SAB_PROXY_USERNAME |
No automated test available for this server. Check the GitHub README for setup instructions.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationNo known vulnerabilities.
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Browser automation with Puppeteer for web scraping and testing
🔥 Official Firecrawl MCP Server - Adds powerful web scraping and search to Cursor, Claude and any other LLM clients.
Production ready MCP server with real-time search, extract, map & crawl.
The Apify MCP server enables your AI agents to extract data from social media, search engines, maps, e-commerce sites, or any other website using thousands of ready-made scrapers, crawlers, and automation tools available on the Apify Store.
MCP Security Weekly
Get CVE alerts and security updates for io.github.ykshah1309/stealth-agent-browser-mcp and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.