Skip to main content

Reconnaissance tool for production scrapers — captures real browser traffic, validates through real proxies, returns a verified scraping plan with runnable starter code.

Project description

browser-recon

Reconnaissance for production scrapers. Launches Chrome on your machine, captures what the browser actually sends, then returns a verified scraping plan: which HTTP library to use, which headers are required, how to handle cookies, which proxy tier, the safe rate-limit — plus a runnable Python starter script.

All processing runs on the browser-recon server. The CLI is a thin client.

Install

pipx install browser-recon

Use

recon login                          # one-time — paste API key from your dashboard
recon scan https://walmart.com       # interactive: launches Chrome, captures, returns report URL

The CLI launches Chrome. You browse the target site for a couple of minutes — click on what you care about, navigate to product pages, run a search, view reviews, whatever data you want to scrape. Press Ctrl+C. The CLI uploads the captured session to the server, shows live progress as the server processes it, then prints the report URL.

What you get back

A single HTML report containing:

  • Detection — which anti-bot vendors protect the target (Cloudflare, Akamai Bot Manager, PerimeterX, DataDome, Imperva, …), with severity tier.
  • Scraping plan — which captured endpoints carry the data you want vs which are session prerequisites vs which are noise.
  • Validation — which HTTP library × proxy tier combination actually works against the live site, measured through real test requests (not inferred from priors).
  • Headers + cookies — the minimum required set, plus cookie warmup instructions if the anti-bot needs a real-browser session first.
  • Rate-limit — measured safe delay between requests.
  • Starter code — a runnable Python script using the recommended library, headers, cookies, and delay.

What this is not

Not a scraper. browser-recon produces the plan for a scraper. You (or your AI assistant) write the scraper using that plan.

Why measurement beats guessing

Most scrapers fail in production because the developer guessed wrong about three things:

  1. Which anti-bot system is in front of the target
  2. Which headers the request actually needs
  3. Whether their IP needs to look residential

browser-recon measures all three by firing real HTTP test requests through real proxies and reporting which combination succeeded. The final recommendation is grounded in what worked, not in what the LLM expected to work.

Architecture

The CLI ships only the non-proprietary glue: Chrome launching, network capture, authentication, upload, and live-progress polling. Roughly 130 KB installed. No detection rules, no validation logic, no LLM prompts, no scoring heuristics live on your machine — everything proprietary runs on the browser-recon server.

The server handles: anti-bot fingerprinting, endpoint inventory analysis, intent-based endpoint classification, proxy-based active validation, secret scrubbing, recommendation synthesis, auxiliary notes and difficulty drivers, and report rendering.

You never need proxy credentials in your shell. The operator's proxy provider account is server-side only.

Status

Active development. v0.3.x is the thin-client architecture (server-side pipeline, animated CLI progress, OIDC-trusted PyPI publishing).

Contributing

Development setup, conventions, and test-suite instructions live in CONTRIBUTING.md.

License

See LICENSE.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

browser_recon-0.3.9.tar.gz (19.7 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

browser_recon-0.3.9-py3-none-any.whl (136.5 kB view details)

Uploaded Python 3

File details

Details for the file browser_recon-0.3.9.tar.gz.

File metadata

  • Download URL: browser_recon-0.3.9.tar.gz
  • Upload date:
  • Size: 19.7 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for browser_recon-0.3.9.tar.gz
Algorithm Hash digest
SHA256 92c73f7050239c9fb2052dbda3e452356d37ed9edec43071cd6090de26be5bba
MD5 8c55e420c6a713e1de812450a9ccdfe4
BLAKE2b-256 59e3e8c577f693378ecf197d9e0099bc8362afbece74ad827c3feff34d8fcfa0

See more details on using hashes here.

Provenance

The following attestation bundles were made for browser_recon-0.3.9.tar.gz:

Publisher: release.yml on lazy-coder-codes/browser-recon

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file browser_recon-0.3.9-py3-none-any.whl.

File metadata

  • Download URL: browser_recon-0.3.9-py3-none-any.whl
  • Upload date:
  • Size: 136.5 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for browser_recon-0.3.9-py3-none-any.whl
Algorithm Hash digest
SHA256 c573d687ce7337834adebd3a86cc3f464fcec00df6554bf0dfa0995e06a4974c
MD5 7bec6b455e274c358f6445db587ea4e6
BLAKE2b-256 25c2b98cb0da43910d2d1cd99b86f640a3ed7ea5570bc7f5be1b4ac69058a7cc

See more details on using hashes here.

Provenance

The following attestation bundles were made for browser_recon-0.3.9-py3-none-any.whl:

Publisher: release.yml on lazy-coder-codes/browser-recon

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page