Skip to main content

Stealth Chromium for browser automation — anti-fingerprinting compiled into the binary

Project description

clark-browser

by Clark — MIT licensed

Stealth Chromium for browser automation. Anti-fingerprinting compiled into the binary at the C++ source level — not a JavaScript injection, not a config patch.

What this is

A fork of ungoogled-chromium 148.0.7778.96 with a patch series that makes the binary indistinguishable from a real Chrome install across the JS-visible fingerprint surface (navigator properties, WebGL GPU strings, screen dimensions, plugins, timezones, etc.).

The patched binary is MIT-licensed — this is an open-source project, not a commercial-licensed stealth browser like CloakBrowser or Multilogin. Build it from source yourself, or use the prebuilt binaries from GitHub Releases.

Why

Stock chromium --headless is trivially detectable: navigator.webdriver = true, empty plugin list, HeadlessChrome in the User-Agent, software-renderer WebGL strings, and a dozen other signals that detection sites grep for. JS-level "stealth" shims (puppeteer-extra-plugin-stealth, playwright-stealth, undetected- chromedriver) only paper over the surface — sites like FingerprintJS, BrowserScan, and Cloudflare Turnstile catch them because the patches themselves are detectable.

clark-browser patches Chromium where the values come from — at the C++ source level, in blink/v8/net — so detection sites just see "a normal Chrome install."

Supported platforms

Platform Status
Linux x86_64 prebuilt binary in releases
macOS arm64 prebuilt binary in releases

Other targets (macOS x86_64, Windows) need a source build.

Usage

Install the Python wrapper from PyPI:

pip install clark-browser

Use it as a Playwright launcher. The wrapper downloads the matching patched Chromium build from GitHub Releases on first launch and caches it under ~/.clarkbrowser/.

from clarkbrowser import launch

browser = launch()
page = browser.new_page()
page.goto("https://bot.sannysoft.com")
print(page.title())
browser.close()

You can also prefetch or inspect the browser binary with the CLI:

clark-browser info
clark-browser fetch

For direct CDP usage, download the tarball for your platform from the releases page, extract it, and run the binary directly. Drive it via any Chrome DevTools Protocol client (CDP over HTTP/WebSocket).

# Linux: extract and launch with CDP on port 9222
tar -xzf clark-browser-linux-x64.tar.gz
./headless_shell \
  --headless=new \
  --remote-debugging-port=9222 \
  --remote-allow-origins=* \
  --fingerprint=12345 \
  --fingerprint-platform=windows \
  about:blank

The Linux tarball contains the headless_shell binary (~270 MB) plus its two required .pak resource files. The macOS arm64 build produces a normal Chromium.app bundle.

Stealth surface

--fingerprint-* switches drive the patches. All have seed-derived defaults when omitted — pass --fingerprint=<integer> for a deterministic identity, or let the binary pick a fresh seed at startup for per-launch variation.

--fingerprint=<int>              master RNG seed (10000..99999)
--fingerprint-platform=          windows | macos | linux
--fingerprint-platform-version=  client hints platform version
--fingerprint-brand=             Chrome | Edge | Opera | Vivaldi
--fingerprint-brand-version=
--fingerprint-gpu-vendor=        WebGL UNMASKED_VENDOR_WEBGL
--fingerprint-gpu-renderer=      WebGL UNMASKED_RENDERER_WEBGL
--fingerprint-hardware-concurrency=
--fingerprint-device-memory=     in GB
--fingerprint-screen-width=
--fingerprint-screen-height=
--fingerprint-taskbar-height=    Win=48, Mac=95, Linux=0
--fingerprint-storage-quota=     in MB
--fingerprint-timezone=          IANA tz, e.g. America/New_York
--fingerprint-locale=            BCP 47
--fingerprint-fonts-dir=         path to platform font directory
--fingerprint-location=          lat,lon for geolocation API
--fingerprint-webrtc-ip=         literal IPv4 to spoof in ICE candidates
--fingerprint-noise=             true | false  (canvas/audio noise on/off)

Verified-working patches

Confirmed firing in CDP-driven smoke tests against the built binary (tests/linux_smoke.py, tests/integration_smoke.py):

Detection vector Patched Verification
navigator.webdriver always false navigator.webdriver === false
navigator.plugins 5 PDF-viewer entries navigator.plugins.length === 5
window.chrome always an object typeof window.chrome === "object"
navigator.platform spoofed from --fingerprint-platform returns "Win32" under =windows
navigator.hardwareConcurrency seed-derived from {4, 6, 8, 12, 16} deterministic per seed
navigator.maxTouchPoints matched to platform 0 on =windows
timezone / locale from --fingerprint-timezone / --locale reaches Blink as set
User-Agent no HeadlessChrome full Chrome UA under --user-agent=...
Audio fingerprint seed-derived deterministic noise two distinct seeds yield distinct audio FP

See PATCHES.md for the full patch catalog and specs/ for per-category implementation notes.

Methodology

We build on ungoogled-chromium (BSD-3) and inherit its existing Brave-derived canvas/audio/clientRects noise infrastructure. Our patches are written from public sources only — W3C specs, Chromium upstream code, MDN bot-detection writeups, and curl-impersonate (MIT). We do not reverse-engineer or copy from any proprietary stealth-browser binary. See METHODOLOGY.md.

Building from source

# 1. Fetch tooling
git clone https://github.com/clark-labs-inc/clark-browser
cd clark-browser

# 2. Fetch Chromium 148 source (~17 GB, ~30 min)
./build/fetch-source.sh

# 3. Apply patches (instant)
./build/apply-patches.sh

# 4. Build (4–12 hours, ~80 GB disk, 32+ GB RAM recommended)
./build/build.sh

For a clean Linux x86_64 build that mirrors what ships in our releases, use ./build/build-linux.sh instead (runs the full clone → patch → ninja pipeline in a single script; designed for fresh Ubuntu hosts).

See build/README.md for detailed prerequisites.

License

MIT. ungoogled-chromium and Chromium upstream components retain their respective BSD/MPL/other licenses; this project does not modify those.

Status

Alpha. Linux x86_64 and macOS arm64 builds are reproducible end-to-end and the patches above are runtime-confirmed against the built binary. The remaining patches in the series compile in but need broader detection-site benchmarking. Contributions welcome — see specs/ for the patch backlog.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

clark_browser-0.1.0.tar.gz (12.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

clark_browser-0.1.0-py3-none-any.whl (14.2 kB view details)

Uploaded Python 3

File details

Details for the file clark_browser-0.1.0.tar.gz.

File metadata

  • Download URL: clark_browser-0.1.0.tar.gz
  • Upload date:
  • Size: 12.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for clark_browser-0.1.0.tar.gz
Algorithm Hash digest
SHA256 6efe70913b0dbefd3ac53a6d38a32e87aaf47c1c171a22d33d8fa024255b66e4
MD5 4b41c1656a6b4df2569fb051f5f207db
BLAKE2b-256 7737e4fe6347c46a446b61e92a11874b45dea213a0595f393c9f8d387313eb45

See more details on using hashes here.

Provenance

The following attestation bundles were made for clark_browser-0.1.0.tar.gz:

Publisher: workflow.yml on clark-labs-inc/clark-browser

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file clark_browser-0.1.0-py3-none-any.whl.

File metadata

  • Download URL: clark_browser-0.1.0-py3-none-any.whl
  • Upload date:
  • Size: 14.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for clark_browser-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 4acea3d321c8e1684b50a2f42d6ba6a5051523dd6d6727bb3faa499127bbc1ce
MD5 075ce9ce593ef21e4cdab0f3c5cad5de
BLAKE2b-256 21b0bf8dfbf3523d706782855845140bfea5f4b43a3a89a8940b0d493e7cffbb

See more details on using hashes here.

Provenance

The following attestation bundles were made for clark_browser-0.1.0-py3-none-any.whl:

Publisher: workflow.yml on clark-labs-inc/clark-browser

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page