The ultimate guide to nodriver-powered browser automation. Bypass Cloudflare, extract with CDP precision, and let Claude AI control the web without triggering a single anti-bot alarm.
In the cat-and-mouse game between automation tools and anti-bot systems, a new player has emerged. Stealth Browser MCP combines the undetectable power of nodriver with the intelligence of AI agents through the Model Context Protocol.
Where Playwright and Puppeteer leave digital fingerprints that scream "I'm a bot," Stealth Browser MCP whispers through protected sites like a human user. 90 tools give Claude AI pixel-perfect control over web interactions, network interception, and element extractionโall while flying under the radar of Cloudflare, Imperva, hCaptcha, and other anti-bot systems.
A Model Context Protocol server that gives AI agents undetectable browser superpowers.
Built on the Model Context Protocol standard introduced by Anthropic, this server enables Claude, Cursor, Cline, and other MCP-compatible AI assistants to control browsers through natural language commands.
Powered by nodriverโthe successor to undetected-chromedriver. It communicates directly with browsers via CDP, eliminating Selenium dependencies and traditional automation markers that trigger bot detection.
Auto-detects and uses your existing Chrome, Chromium, or Edge installation. No special browser binaries, no modified user agentsโjust your real browser controlled by AI.
Receives natural language command
Translates to tool calls via FastMCP
Executes via Chrome DevTools Protocol
Performs action undetectably
Returns structured data to AI
Understanding the technical reasons why traditional automation fails and how nodriver succeeds.
Traditional tools set this flag to true. Nodriver launches real browser instances without it.
Headless browsers have empty plugin arrays. Real Chrome has actual plugins installed.
Avoids Runtime.enable CDP command that creates detectable side effects.
Uses OS-level mouse/keyboard events that match real user interaction patterns.
Missing window.chrome, limited hardwareConcurrency, and other headless tells are avoided.
Uses real browser TLS stack instead of detectable automation library signatures.
โWhat makes nodriver different is the optimization to stay undetected for most anti-bot solutions. It uses real browser instances without automation markersโthe asynchronous architecture also makes it significantly faster.โโ nodriver Documentation
Organized into 11 logical sections. Enable all 90, use minimal mode with 22 core tools, or disable specific sections for your use case.
11
Instance & navigation control
11
Click, type, scroll, wait
9
CDP-based element cloning
9
Persistent storage
5
Request monitoring
13
Direct DevTools access
10
On-demand expansion
3
Session persistence
5
Multi-tab control
6
Screenshots & analysis
10
AI-generated intercepts
All 90 tools enabled
python src/server.py22 core tools only
python src/server.py --minimalDisable specific sections
--disable-cdp-functionsExtract UI elements with pixel-perfect precision using Chrome DevTools Protocol. Capture styles, structure, computed properties, and event handlers for exact recreation.
// Claude command:
"Extract the hero section from this page with all styles"
// Stealth Browser MCP extracts:
{
html: "<section class='hero'>...</section>",
css: "computed-styles.css",
events: ["click", "hover", "scroll"],
dimensions: { width: 1920, height: 800 }
}AI agents can write Python functions that intercept network traffic in real-time. Block requests, redirect endpoints, inject headers, or replace response bodies.
# AI-generated hook function
def intercept_analytics(request):
# Block tracking requests
if "analytics" in request.url:
return {"action": "block"}
# Modify headers
if "api" in request.url:
request.headers["X-Custom"] = "value"
return {"action": "continue"}Version 0.2.4 introduced "Instant Text Pasting" via CDP and smart newline handling. Instead of character-by-character typing, text is inserted directlyโ10x faster while still appearing natural.
// Smart newline handling
"Fill the form with:\n- Name: John\n- Email: john@test.com"
// Converts \n to actual Enter key presses
// Handles multi-line inputs naturally
// No detection from keypress monitoringWhy traditional automation tools fail where stealth succeeds.
From competitive intelligence to UI recreation, discover how teams leverage undetectable automation.
Extract pricing, features, and product data from protected competitor sites without triggering anti-scraping measures.
Recreate interface sections with pixel-perfect HTML/CSS extraction. The "Augment Code Hero Clone" demo shows exact recreation.
Watch product pages for availability changes on sites with aggressive bot protection like sneaker drops or limited releases.
Intercept and analyze network requests to understand undocumented APIs. Dynamic hooks capture every request/response.
Test authentication flows, session handling, and security controls on protected applications for authorized penetration testing.
Manage accounts on platforms with sophisticated bot detection. Real browser fingerprints pass authenticity checks.
Get the source code from GitHub
git clone https://github.com/AstroMined/stealth-browser-mcp.git cd stealth-browser-mcpSet up Python environment and requirements
python -m venv venv
source venv/bin/activate # or venv\Scripts\activate on Windows
pip install -r requirements.txtAdd to your MCP configuration
{
"mcpServers": {
"stealth-browser": {
"command": "python",
"args": ["path/to/stealth-browser-mcp/src/server.py"],
"env": {}
}
}
}Combine undetectable browser automation with real 4G/5G mobile IPs for the ultimate anti-detection stack.
Our 4G/5G mobile proxies pair perfectly with Stealth Browser MCP. Configure proxy settings in your browser launch options:
socks5://user:pass@us.proxies.sx:5057No automation tool is 100% undetectable forever. Anti-bot companies continuously evolve their detection methods. However, Stealth Browser MCP using nodriver achieves a claimed 98.7% success rate on protected sites by avoiding traditional automation markers like navigator.webdriver, using real browser instances, and communicating via CDP without triggering common detection vectors.
Stealth Browser MCP auto-detects and uses Chrome, Chromium, or Microsoft Edge installations on your system. No special browser binaries or modifications requiredโit uses your actual browser.
Yes, the nodriver foundation is specifically designed to bypass Cloudflare, Imperva, hCaptcha, and other anti-bot systems. Real browser instances with proper fingerprints typically pass Cloudflare's bot detection challenges.
While puppeteer-extra-plugin-stealth patches known detection vectors, it still uses Puppeteer's automation architecture. Nodriver takes a fundamentally different approach by communicating directly with browsers without Selenium/WebDriver, avoiding an entire category of detection vectors.
Version 0.2.4 introduced automatic environment detection for containers. It auto-adds sandbox bypass flags for root/admin privileges and handles Docker/Kubernetes environments. Note that VPS/headless environments may have higher detection rates due to IP reputation and other factors.
Combine Stealth Browser MCP with PROXIES.SX mobile proxies for the most robust anti-detection automation stack available.
PROXIES.SX Team
Building the future of proxy infrastructure