Stealth Automation90 Tools
18 min read

Stealth Browser MCP:
Undetectable AI Automation

The ultimate guide to nodriver-powered browser automation. Bypass Cloudflare, extract with CDP precision, and let Claude AI control the web without triggering a single anti-bot alarm.

90
Modular Tools
98.7%
Success Rate
11
Tool Sections
0
Detection Flags

In the cat-and-mouse game between automation tools and anti-bot systems, a new player has emerged. Stealth Browser MCP combines the undetectable power of nodriver with the intelligence of AI agents through the Model Context Protocol.

Where Playwright and Puppeteer leave digital fingerprints that scream "I'm a bot," Stealth Browser MCP whispers through protected sites like a human user. 90 tools give Claude AI pixel-perfect control over web interactions, network interception, and element extractionโ€”all while flying under the radar of Cloudflare, Imperva, hCaptcha, and other anti-bot systems.

Understanding the Technology

What is Stealth Browser MCP?

A Model Context Protocol server that gives AI agents undetectable browser superpowers.

MCP Integration

Built on the Model Context Protocol standard introduced by Anthropic, this server enables Claude, Cursor, Cline, and other MCP-compatible AI assistants to control browsers through natural language commands.

Nodriver Foundation

Powered by nodriverโ€”the successor to undetected-chromedriver. It communicates directly with browsers via CDP, eliminating Selenium dependencies and traditional automation markers that trigger bot detection.

Real Browser Instances

Auto-detects and uses your existing Chrome, Chromium, or Edge installation. No special browser binaries, no modified user agentsโ€”just your real browser controlled by AI.

Architecture Flow

1
Claude AI

Receives natural language command

2
MCP Server

Translates to tool calls via FastMCP

3
Nodriver

Executes via Chrome DevTools Protocol

4
Real Browser

Performs action undetectably

5
Results

Returns structured data to AI

Anti-Detection Deep Dive

Why It's Undetectable

Understanding the technical reasons why traditional automation fails and how nodriver succeeds.

Bypassed

No navigator.webdriver

Traditional tools set this flag to true. Nodriver launches real browser instances without it.

Bypassed

Real Browser Plugins

Headless browsers have empty plugin arrays. Real Chrome has actual plugins installed.

Bypassed

CDP Fingerprint Evasion

Avoids Runtime.enable CDP command that creates detectable side effects.

Bypassed

Human-like Input

Uses OS-level mouse/keyboard events that match real user interaction patterns.

Bypassed

No Automation Markers

Missing window.chrome, limited hardwareConcurrency, and other headless tells are avoided.

Bypassed

Native TLS Fingerprint

Uses real browser TLS stack instead of detectable automation library signatures.

โ€œWhat makes nodriver different is the optimization to stay undetected for most anti-bot solutions. It uses real browser instances without automation markersโ€”the asynchronous architecture also makes it significantly faster.โ€
โ€” nodriver Documentation
Complete Toolkit

90 Modular Tools

Organized into 11 logical sections. Enable all 90, use minimal mode with 22 core tools, or disable specific sections for your use case.

Browser

11

Instance & navigation control

Elements

11

Click, type, scroll, wait

Extraction

9

CDP-based element cloning

File Export

9

Persistent storage

Network

5

Request monitoring

CDP Functions

13

Direct DevTools access

Progressive Clone

10

On-demand expansion

Cookies

3

Session persistence

Tabs

5

Multi-tab control

Debug

6

Screenshots & analysis

Hooks

10

AI-generated intercepts

Modular Installation Modes

Full Mode

All 90 tools enabled

python src/server.py
Minimal Mode

22 core tools only

python src/server.py --minimal
Custom Mode

Disable specific sections

--disable-cdp-functions
Advanced Capabilities

Killer Features

CDP Element Extraction

Extract UI elements with pixel-perfect precision using Chrome DevTools Protocol. Capture styles, structure, computed properties, and event handlers for exact recreation.

  • Pixel-accurate cloning
  • Style inheritance capture
  • Event handler extraction
  • Computed CSS properties
javascript
// Claude command:
"Extract the hero section from this page with all styles"

// Stealth Browser MCP extracts:
{
  html: "<section class='hero'>...</section>",
  css: "computed-styles.css",
  events: ["click", "hover", "scroll"],
  dimensions: { width: 1920, height: 800 }
}

Dynamic Hook System

AI agents can write Python functions that intercept network traffic in real-time. Block requests, redirect endpoints, inject headers, or replace response bodies.

  • Request blocking
  • Response modification
  • Header injection
  • Real-time interception
python
# AI-generated hook function
def intercept_analytics(request):
    # Block tracking requests
    if "analytics" in request.url:
        return {"action": "block"}

    # Modify headers
    if "api" in request.url:
        request.headers["X-Custom"] = "value"

    return {"action": "continue"}

10x Faster Text Input

Version 0.2.4 introduced "Instant Text Pasting" via CDP and smart newline handling. Instead of character-by-character typing, text is inserted directlyโ€”10x faster while still appearing natural.

Traditional typing~500ms per character
CDP instant paste~50ms total
javascript
// Smart newline handling
"Fill the form with:\n- Name: John\n- Email: john@test.com"

// Converts \n to actual Enter key presses
// Handles multi-line inputs naturally
// No detection from keypress monitoring
Comparison

Stealth Browser MCP vs Playwright MCP

Why traditional automation tools fail where stealth succeeds.

Feature
Stealth Browser
Playwright
Cloudflare Bypass
Anti-Bot Evasion
CDP Element Extraction
Network Hook System
Banking/Gov Portals
Social Media Automation
UI Cloning Accuracy
No Webdriver Detection
Success Rate
98.7%
Commonly Blocked

Real-World Applications

From competitive intelligence to UI recreation, discover how teams leverage undetectable automation.

Competitive Analysis

Extract pricing, features, and product data from protected competitor sites without triggering anti-scraping measures.

UI/UX Cloning

Recreate interface sections with pixel-perfect HTML/CSS extraction. The "Augment Code Hero Clone" demo shows exact recreation.

Inventory Monitoring

Watch product pages for availability changes on sites with aggressive bot protection like sneaker drops or limited releases.

API Reverse Engineering

Intercept and analyze network requests to understand undocumented APIs. Dynamic hooks capture every request/response.

Security Research

Test authentication flows, session handling, and security controls on protected applications for authorized penetration testing.

Social Media Automation

Manage accounts on platforms with sophisticated bot detection. Real browser fingerprints pass authenticity checks.

Quick Start

Get Started in Minutes

1

Clone the Repository

Get the source code from GitHub

bash
git clone https://github.com/AstroMined/stealth-browser-mcp.git cd stealth-browser-mcp
2

Install Dependencies

Set up Python environment and requirements

bash
python -m venv venv
source venv/bin/activate  # or venv\Scripts\activate on Windows
pip install -r requirements.txt
3

Configure Claude Desktop

Add to your MCP configuration

json
{
  "mcpServers": {
    "stealth-browser": {
      "command": "python",
      "args": ["path/to/stealth-browser-mcp/src/server.py"],
      "env": {}
    }
  }
}
Level Up with Proxies

Stealth Browser + Mobile Proxies = Unstoppable

Combine undetectable browser automation with real 4G/5G mobile IPs for the ultimate anti-detection stack.

Why Mobile Proxies Matter

  • Real mobile IPs from T-Mobile, Verizon, AT&T
  • Carrier-grade NAT provides natural IP rotation
  • Mobile user-agents match real device fingerprints
  • Geographic targeting for location-specific content
  • Trusted IP reputation from residential pools

PROXIES.SX Integration

Our 4G/5G mobile proxies pair perfectly with Stealth Browser MCP. Configure proxy settings in your browser launch options:

socks5://user:pass@us.proxies.sx:5057
View Mobile Proxy Plans

Frequently Asked Questions

Is Stealth Browser MCP truly undetectable?

No automation tool is 100% undetectable forever. Anti-bot companies continuously evolve their detection methods. However, Stealth Browser MCP using nodriver achieves a claimed 98.7% success rate on protected sites by avoiding traditional automation markers like navigator.webdriver, using real browser instances, and communicating via CDP without triggering common detection vectors.

Which browsers are supported?

Stealth Browser MCP auto-detects and uses Chrome, Chromium, or Microsoft Edge installations on your system. No special browser binaries or modifications requiredโ€”it uses your actual browser.

Can it bypass Cloudflare?

Yes, the nodriver foundation is specifically designed to bypass Cloudflare, Imperva, hCaptcha, and other anti-bot systems. Real browser instances with proper fingerprints typically pass Cloudflare's bot detection challenges.

How does it compare to Puppeteer with stealth plugin?

While puppeteer-extra-plugin-stealth patches known detection vectors, it still uses Puppeteer's automation architecture. Nodriver takes a fundamentally different approach by communicating directly with browsers without Selenium/WebDriver, avoiding an entire category of detection vectors.

Does it work in Docker/headless environments?

Version 0.2.4 introduced automatic environment detection for containers. It auto-adds sandbox bypass flags for root/admin privileges and handles Docker/Kubernetes environments. Note that VPS/headless environments may have higher detection rates due to IP reputation and other factors.

Ready to Automate Undetectably?

Combine Stealth Browser MCP with PROXIES.SX mobile proxies for the most robust anti-detection automation stack available.

PROXIES.SX Team

Building the future of proxy infrastructure