Advanced Web Crawling Platform with Deep Analysis and MCP Server
Project description
Crawilfy MCP Server
A free, open-source MCP server that gives any agent (Claude Code, Cursor, Windsurf, …) 55 production-grade tools for the full web-crawling stack: deep analysis, stealth, API discovery, session recording → runnable crawler, smart extraction. No proprietary API. No per-request fee.
Quick start
The recommended path needs no install — uvx runs straight from PyPI:
{
"mcpServers": {
"crawilfy": {
"command": "uvx",
"args": ["crawilfy-mcp-server"]
}
}
}
Requires
uv. Install once:curl -LsSf https://astral.sh/uv/install.sh | sh. Or usepipx run crawilfy-mcp-server/pip install crawilfy-mcp-serverinstead.
Where to put that JSON: Cursor → Settings → MCP. Claude Code → ~/.config/claude/mcp_settings.json. Windsurf → Settings → MCP Servers.
How it works
Your agent talks to Crawilfy over the Model Context Protocol. Crawilfy owns a hardened browser pool, an HTTP stack with TLS fingerprinting, and a rotating proxy pool. While it fetches pages, it captures network traffic, reads scripts, and introspects schemas — so the agent gets clean structured data, not raw HTML.
What's in the box
A short list — see the source for the full set of 55 tools.
| Group | Tools |
|---|---|
| Deep analysis | deep_analyze, discover_apis, introspect_graphql, analyze_websocket, analyze_auth, detect_protection, detect_technology |
| Stealth | stealth_request, configure_proxies, configure_rate_limit, add_proxy, test_proxy |
| Record → crawler | record_session, stop_recording, export_recording, generate_crawler |
| Extraction | smart_extract, extract_article, extract_tables, extract_links, extract_forms, extract_metadata, convert_to_markdown |
| Page interaction | take_screenshot, fill_form, wait_and_extract, compare_pages, measure_performance, check_accessibility, get_dom_tree |
| Sessions & cache | save_session, load_session, get_cookies, get_storage, clear_cache, get_cache_stats |
| Advanced (opt-in) | execute_js, execute_cdp, deobfuscate_js, extract_from_js, solve_captcha |
Smart extraction — bring any LLM, including free ones
smart_extract works without any API key using pattern matching. Plug in any OpenAI-compatible endpoint for higher accuracy — including FREE tiers:
# OpenRouter (free models exist)
CRAWILFY_LLM_PROVIDER=openrouter
CRAWILFY_LLM_API_KEY=sk-or-v1-xxx
CRAWILFY_LLM_MODEL=meta-llama/llama-3.2-3b-instruct:free
# Groq (free, very fast)
CRAWILFY_LLM_PROVIDER=groq
CRAWILFY_LLM_API_KEY=gsk_xxx
# Local Ollama (no key needed)
CRAWILFY_LLM_PROVIDER=ollama
CRAWILFY_LLM_MODEL=llama3.2
Together, DeepSeek, Mistral, Fireworks, and standard OpenAI also work via CRAWILFY_LLM_BASE_URL.
Configuration
| Variable | Default | Notes |
|---|---|---|
CRAWILFY_HEADLESS |
true |
Run browser without UI |
CRAWILFY_BROWSER |
chromium |
chromium / firefox / webkit |
CRAWILFY_POOL_SIZE |
5 |
Max concurrent browsers |
CRAWILFY_NAV_TIMEOUT |
30.0 |
Page-load timeout (s) |
CRAWILFY_API_KEY |
unset | If set, every tool call must include matching _api_key |
CRAWILFY_ALLOW_DANGEROUS_JS |
false |
Required for execute_js / execute_cdp / deobfuscate_js |
CRAWILFY_JS_MAX_LENGTH |
50000 |
Length cap for JS payloads |
CRAWILFY_JS_EXEC_TIMEOUT |
10.0 |
Per-script timeout (s) |
Security
execute_js, execute_cdp, and deobfuscate_js are disabled by default — they execute or operate on arbitrary code in a real browser. Enable on trusted networks with CRAWILFY_ALLOW_DANGEROUS_JS=true. Even then, payloads are length-capped, time-bounded, and a denylist rejects eval, new Function, dynamic import(), document.write, importScripts, and WebAssembly.{compile,instantiate}. Set CRAWILFY_API_KEY so MCP clients must present a matching _api_key.
These are mitigations, not a sandbox: do not expose this server to untrusted clients.
Develop
git clone https://github.com/razavioo/crawilfy-mcp-server.git
cd crawilfy-mcp-server
make dev-install # editable install + dev/captcha/ocr extras + pre-commit
make test # pytest
make lint # ruff + mypy
PRs welcome. Particularly interested in: distributed mode (Redis queue), result sinks (Postgres / S3), Prometheus metrics. See MIT License.
Made by emad.dev
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file crawilfy_mcp_server-1.1.1.tar.gz.
File metadata
- Download URL: crawilfy_mcp_server-1.1.1.tar.gz
- Upload date:
- Size: 143.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
07cc8ce9f048fde717b6e7198afc0812a38c9abb3f26531417a6740f62589f01
|
|
| MD5 |
5c108bb8c0e91253f87157d650330435
|
|
| BLAKE2b-256 |
f263cdedfa7f0b591fdf4a6bb5cf880423479108e2d58e5c4d128de6530bdf06
|
File details
Details for the file crawilfy_mcp_server-1.1.1-py3-none-any.whl.
File metadata
- Download URL: crawilfy_mcp_server-1.1.1-py3-none-any.whl
- Upload date:
- Size: 122.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
533f6c7ab90793e8437497b25bd3f086257950ab6647a3e45676dd46ffae71a3
|
|
| MD5 |
b8776506590f35b6ae6f502054079159
|
|
| BLAKE2b-256 |
36bbe3ac93e4d8e874eab2ce198f7d1ededa5545b17c9618d12203ccf311396f
|