MCP Hub
Back to servers

CloakMCP

An MCP server that provides LLMs with stealth browser automation capabilities via CloakBrowser to bypass bot detection services like Cloudflare and reCAPTCHA. It supports full page interaction, content extraction, and human-like behavior through 30 specialized tools.

glama
Updated
Mar 27, 2026

CloakBrowserMCP

MCP server for CloakBrowser — giving AI models full access to a stealth Chromium that passes every bot detection test.

License: MIT Python 3.10+

What is this?

CloakBrowserMCP exposes CloakBrowser's stealth browser automation as an MCP (Model Context Protocol) server. Any AI model that speaks MCP can launch a source-level patched Chromium, navigate pages, interact with elements, take screenshots, and extract content — all while passing Cloudflare Turnstile, reCAPTCHA v3, FingerprintJS, and 30+ other detection services.

CloakBrowser is not a JS injection or config hack — it's a real Chromium binary with 33 C++ source-level patches. This MCP server wraps its full Python API into 21 tools that models can call directly.

Install

One-line setup (clones, installs, downloads the stealth binary, runs tests):

curl -fsSL https://raw.githubusercontent.com/overtimepog/CloakMCP/main/setup.sh | bash

pip install:

pip install cloakbrowsermcp

From source:

git clone https://github.com/overtimepog/CloakMCP.git
cd CloakMCP
pip install -e ".[dev]"

Quick Start

Claude Desktop / Claude Code

Add to your MCP config:

{
  "mcpServers": {
    "cloakbrowser": {
      "command": "cloakbrowsermcp"
    }
  }
}

Run standalone

cloakbrowsermcp

Tools

Browser Lifecycle

ToolDescription
launch_browserLaunch stealth Chromium with anti-detection. Supports proxy, humanize, persistent profiles, fingerprint seeds, timezone/locale, and custom viewport.
close_browserClose the browser and all pages.

Page Management

ToolDescription
new_pageOpen a new tab, optionally navigating to a URL.
close_pageClose a specific page by ID.
list_pagesList all open pages with IDs and URLs.

Navigation

ToolDescription
navigateGo to a URL with configurable wait strategy and timeout.

Interaction

ToolDescription
clickClick an element. With humanize=True, uses Bézier mouse curves.
type_textType with per-key events — better for reCAPTCHA than fill.
fill_formSet a form field value directly.
hoverHover over an element with realistic mouse movement.
select_optionSelect from a <select> dropdown by value, label, or index.
press_keyPress keyboard keys (Enter, Tab, Escape, etc).
scrollScroll with realistic acceleration curves when humanized.

Content & Data

ToolDescription
screenshotCapture full page, viewport, or element screenshots (base64 PNG).
get_contentExtract HTML, visible text, or outer HTML from a selector.
evaluateRun JavaScript in the page context and return results.
wait_for_selectorWait for elements to appear, disappear, attach, or detach.
get_cookiesGet all cookies from the browser context.
set_cookiesSet cookies in the browser context.
get_page_infoGet current URL and title.
pdfGenerate a PDF of the page.

Key Features

Anti-Detection Stealth

Every browser session uses CloakBrowser's source-level patches:

  • 33 C++ patches — canvas, WebGL, audio, fonts, GPU, screen, automation signals
  • 0.9 reCAPTCHA v3 score — human-level, server-verified
  • Passes Cloudflare Turnstile, FingerprintJS, BrowserScan, and 30+ detection services
  • navigator.webdriver = false at the source level

Human-Like Behavior

launch_browser(humanize=True)

One flag makes all interactions behave like a real user:

  • Mouse: Bézier curves with easing and slight overshoot
  • Keyboard: per-character timing, thinking pauses, occasional typos
  • Scroll: accelerate → cruise → decelerate micro-steps

Persistent Profiles

launch_browser(user_data_dir="./my-profile")

Cookies, localStorage, and cache persist across sessions. Bypasses incognito detection.

Fingerprint Pinning

launch_browser(fingerprint_seed="42069")

Same seed = same fingerprint across launches. Look like a returning visitor instead of a new device each time.

Proxy Support

launch_browser(proxy="http://user:pass@proxy:8080", geoip=True)

Auto-detects timezone and locale from the proxy IP.

Architecture

┌─────────────┐     MCP Protocol      ┌──────────────────┐
│  AI Model   │ ◄──────────────────► │  CloakBrowserMCP  │
│ (Claude,    │    stdio / HTTP       │                  │
│  GPT, etc)  │                       │  21 tools        │
└─────────────┘                       │  session mgmt    │
                                      │  page tracking   │
                                      └────────┬─────────┘
                                               │
                                      ┌────────▼─────────┐
                                      │   CloakBrowser    │
                                      │                  │
                                      │  Patched Chromium │
                                      │  33 C++ patches   │
                                      │  Playwright API   │
                                      └──────────────────┘
  • cloakbrowsermcp/server.py — MCP server with all tool registrations
  • cloakbrowsermcp/session.py — Browser lifecycle & page management
  • cloakbrowsermcp/tools.py — Core tool handlers (navigate, click, type, screenshot, etc.)
  • cloakbrowsermcp/tools_advanced.py — Stealth config, network interception, viewport, media emulation

Development

git clone https://github.com/overtimepog/CloakMCP.git
cd CloakMCP
pip install -e ".[dev]"

# Run tests (80 tests, all mocked — no browser needed)
pytest

# Run tests with verbose output
pytest -v

License

MIT — see LICENSE.

Credits

Built on CloakBrowser by CloakHQ and the Model Context Protocol Python SDK.

Reviews

No reviews yet

Sign in to write a review