Skip to main content

Reconnaissance tool for production scrapers — captures real browser traffic, validates through real proxies, returns a verified scraping plan with runnable starter code.

Project description

browser-recon

Reconnaissance for production scrapers. Launches Chrome on your machine, captures what the browser actually sends, then returns a verified scraping plan: which HTTP library to use, which headers are required, how to handle cookies, which proxy tier, the safe rate-limit — plus a runnable Python starter script.

All processing runs on the browser-recon server. The CLI is a thin client.

Install

pipx install browser-recon

Use

recon login                          # one-time — paste API key from your dashboard
recon scan https://walmart.com       # interactive: launches Chrome, captures, returns report URL

The CLI launches Chrome. You browse the target site for a couple of minutes — click on what you care about, navigate to product pages, run a search, view reviews, whatever data you want to scrape. Press Ctrl+C. The CLI uploads the captured session to the server, shows live progress as the server processes it, then prints the report URL.

What you get back

A single HTML report containing:

  • Detection — which anti-bot vendors protect the target (Cloudflare, Akamai Bot Manager, PerimeterX, DataDome, Imperva, …), with severity tier.
  • Scraping plan — which captured endpoints carry the data you want vs which are session prerequisites vs which are noise.
  • Validation — which HTTP library × proxy tier combination actually works against the live site, measured through real test requests (not inferred from priors).
  • Headers + cookies — the minimum required set, plus cookie warmup instructions if the anti-bot needs a real-browser session first.
  • Rate-limit — measured safe delay between requests.
  • Starter code — a runnable Python script using the recommended library, headers, cookies, and delay.

What this is not

Not a scraper. browser-recon produces the plan for a scraper. You (or your AI assistant) write the scraper using that plan.

Why measurement beats guessing

Most scrapers fail in production because the developer guessed wrong about three things:

  1. Which anti-bot system is in front of the target
  2. Which headers the request actually needs
  3. Whether their IP needs to look residential

browser-recon measures all three by firing real HTTP test requests through real proxies and reporting which combination succeeded. The final recommendation is grounded in what worked, not in what the LLM expected to work.

Architecture

The CLI ships only the non-proprietary glue: Chrome launching, network capture, authentication, upload, and live-progress polling. Roughly 130 KB installed. No detection rules, no validation logic, no LLM prompts, no scoring heuristics live on your machine — everything proprietary runs on the browser-recon server.

The server handles: anti-bot fingerprinting, endpoint inventory analysis, intent-based endpoint classification, proxy-based active validation, secret scrubbing, recommendation synthesis, auxiliary notes and difficulty drivers, and report rendering.

You never need proxy credentials in your shell. The operator's proxy provider account is server-side only.

Status

Active development. v0.3.x is the thin-client architecture (server-side pipeline, animated CLI progress, OIDC-trusted PyPI publishing).

Contributing

Development setup, conventions, and test-suite instructions live in CONTRIBUTING.md.

License

See LICENSE.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

browser_recon-0.3.4.tar.gz (19.3 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

browser_recon-0.3.4-py3-none-any.whl (131.2 kB view details)

Uploaded Python 3

File details

Details for the file browser_recon-0.3.4.tar.gz.

File metadata

  • Download URL: browser_recon-0.3.4.tar.gz
  • Upload date:
  • Size: 19.3 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for browser_recon-0.3.4.tar.gz
Algorithm Hash digest
SHA256 dcd6fb40a019dc34aa8cc0f2af5afbba019124f32f9a5506aeb3509c99654666
MD5 eab33840d43f3b211d08b7e6283d2114
BLAKE2b-256 589d734f121a4f1ac7c4d57e196115d5e178921c17b7d0033e90cd2948f646d9

See more details on using hashes here.

Provenance

The following attestation bundles were made for browser_recon-0.3.4.tar.gz:

Publisher: release.yml on lazy-coder-codes/browser-recon

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file browser_recon-0.3.4-py3-none-any.whl.

File metadata

  • Download URL: browser_recon-0.3.4-py3-none-any.whl
  • Upload date:
  • Size: 131.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for browser_recon-0.3.4-py3-none-any.whl
Algorithm Hash digest
SHA256 3667dedd320780c2cb9edba4fcec59d6dc410e4ee2a5b031389bd8a221b63842
MD5 5827dfef002b41b933ae98c3ccfe9bed
BLAKE2b-256 8d6722e399c898c331973e8ad100b25217d04945430db61e766742d67d0e00f0

See more details on using hashes here.

Provenance

The following attestation bundles were made for browser_recon-0.3.4-py3-none-any.whl:

Publisher: release.yml on lazy-coder-codes/browser-recon

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page