MCP server providing Google Search, web scraping, and multi-source research tools for AI assistants
MCP server providing Google Search, web scraping, and multi-source research tools for AI assistants
Is it safe?
No known CVEs for playwright. 1 previously resolved.
No authentication — any process on your machine can connect to this server.
License not specified.
Last scanned 0 days ago.
Is it maintained?
Last commit 3 days ago. 21 GitHub stars. 43,542,072 weekly downloads.
Will it work with my client?
Transport: stdio, sse, http. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
How much context will it use?
8 tools. Estimated ~700 tokens of your context window (0.4% of 200K).
What if it doesn't work?
Common issues: JSON syntax errors in config, wrong Node.js version, npx cache, network or firewall blocking. Setup guide covers troubleshooting. Or check GitHub issues for known problems.
{
"mcpServers": {
"google-researcher": {
"env": {
"GOOGLE_CUSTOM_SEARCH_ID": "YOUR_SEARCH_ID_HERE",
"GOOGLE_CUSTOM_SEARCH_API_KEY": "YOUR_API_KEY_HERE"
},
"args": [
"-y",
"google-researcher-mcp"
],
"command": "npx"
}
}
}Run this in your terminal to verify the server starts. Then let us know if it worked — your result helps other developers.
npx -y playwright 2>&1 | head -1 && echo "✓ Server started successfully"
After testing, let us know if it worked:
google_searchWeb search with site, date, and language filters
google_news_searchNews search with freshness controls
google_image_searchImage search with type, size, color filters
scrape_pageExtract content from web pages, PDFs, DOCX
search_and_scrapeCombined search + content extraction
academic_searchPapers from arXiv, PubMed, IEEE, Springer
patent_searchPatent search with assignee/inventor filters
sequential_searchMulti-step research tracking
Last scanned 6h ago
No open vulnerabilities. 1 fixed CVE.
CVE-2025-59288FixedPlaywright downloads and installs browsers without verifying the authenticity of the SSL certificate
### Summary Use of `curl` with the `-k` (or `--insecure`) flag in installer scripts allows attackers to deliver arbitrary executables via Man-in-the-Middle (MitM) attacks. This can lead to full system compromise, as the downloaded files are installed as privileged applications. ### Details The following scripts in the `microsoft/playwright` repository at commit [`bee11cbc28f24bd18e726163d0b9b1571b4f26a8`](https://github.com/microsoft/playwright/commit/bee11cbc28f24bd18e726163d0b9b1571b4f26a8) u
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.