Skip to main content

MCP server for browser automation with anti-detection. Scout pages, find elements, interact with websites, and monitor network traffic.

Project description

scout-mcp-server

MCP server for browser automation with anti-detection. Scout pages, find elements, interact with websites, and monitor network traffic — from any AI client that supports the Model Context Protocol.

Built on botasaurus-driver for automatic fingerprint evasion and stealth browsing. Sites that block Playwright and Selenium see a normal browser session.


How It Works

Scout reads the page structure, then acts — the same way you'd inspect a page in DevTools before clicking anything:

  1. Scout — compact structural overview (~200 tokens, not a raw DOM dump)
  2. Find — search for elements by text, type, or selector
  3. Act — click, type, select, navigate
  4. Scout again — see what changed

Most browser-automation tools for AI take full-page screenshots and have the model interpret pixels. A single Playwright MCP screenshot costs ~124,000 tokens and the model still has to guess at selectors from what it sees. Scout reads the DOM directly and returns a compact report (~200 tokens) with exact CSS selectors — 98% less than a screenshot.

Credential Safety

fill_secret reads credentials from .env server-side and types them directly into form fields. The AI client only sees "chars_typed": 22 — never the actual value. Exported scripts use ${ENV_VAR} references. Authorization and Cookie headers are scrubbed from network logs before they reach the conversation.

2FA Support

get_2fa_code polls Twilio's SMS API for OTP codes — the AI clicks "Send Code" in the browser, the tool watches for the SMS, extracts the code, and types it in. Requires a Twilio account with an SMS number set as the 2FA recipient.

Anti-Detection

Scout uses Botasaurus under the hood, which handles browser fingerprinting and detection evasion automatically. Sites that block Selenium and Playwright see a normal browser session.


Comparison

Scout Playwright MCP Chrome Extension MCP Selenium / scripts
Works on sites you don't control Yes Limited — your own app Limited — your active session Blocked by detection
Page discovery Compact scout (~200 tokens) Full screenshot (~124,000 tokens) You provide selectors You provide selectors
Credential safety Never in conversation Plaintext in context Plaintext in context In your script
Anti-detection Built-in None None None
2FA Built-in No No You build it
Export to script One command No No You write it
Cross-platform scheduling One command No No You configure it

Benchmarks

Task Scout tokens Playwright MCP tokens Reduction Wall-clock Success
Fact lookup (Wikipedia) ~1,264 ~124,000 98% fewer 11.0s 3/3
Form fill + verify (httpbin) ~3,799 ~124,000 97% fewer 25.2s 3/3

Claude Sonnet 4.6, 3 runs each, wall-clock = browser time only (excludes model reasoning). Playwright MCP baseline is a single full-page screenshot. Full results: v0.2


Install

Prerequisites: Python 3.11+, Google Chrome

Via PyPI (recommended)

pip install scout-mcp-server

Or run without installing:

uvx scout-mcp-server

Via npm

npx -y scout-mcp-server

Configure Your AI Client

You configure Scout once. After that, your AI client starts and stops the server automatically — you never run it manually.

Claude Code

claude mcp add scout -- npx -y scout-mcp-server

Restart Claude Code. Scout's 17 tools are now available in every session.

Claude Desktop

Add to your claude_desktop_config.json:

{
  "mcpServers": {
    "scout": {
      "command": "npx",
      "args": ["-y", "scout-mcp-server"]
    }
  }
}

Cursor

In Cursor Settings > MCP Servers, add:

{
  "mcpServers": {
    "scout": {
      "command": "npx",
      "args": ["-y", "scout-mcp-server"]
    }
  }
}

Windsurf / Continue / Other MCP Clients

Use the same JSON configuration above — it works with any MCP-compatible client.


Environment Variables

Scout loads variables from a .env file using this search order:

  1. Explicit env_file path passed to fill_secret
  2. SCOUT_ENV_FILE environment variable
  3. .env in the current working directory
Variable Description
SCOUT_ALLOW_LOCALHOST Set to 1, true, or yes to allow navigating to localhost URLs (disabled by default)
TWILIO_ACCOUNT_SID Twilio account SID for 2FA code retrieval
TWILIO_AUTH_TOKEN Twilio auth token
TWILIO_PHONE_NUMBER Twilio phone number receiving 2FA SMS codes

Security

  • Credential isolationfill_secret reads from .env server-side; passwords never enter the conversation
  • Header redaction — Authorization, Cookie, and API key headers scrubbed from network logs
  • Export scrubbing — credentials parameterized as environment variable references
  • URL scheme allowlist — only http and https schemes permitted; all others rejected
  • SSRF protection — IP addresses normalized via ipaddress module to catch IPv6-mapped IPv4 bypasses; blocks cloud metadata endpoints (AWS, GCP, Alibaba), loopback, and link-local addresses
  • Safe XML parsing — uses defusedxml to prevent XXE attacks when processing SpreadsheetML files
  • JS execution timeout — 2-minute cap on execute_javascript with graceful error response
  • Scheduler name validation — regex pattern prevents path traversal in task scheduler namespaces
  • Path traversal protection — validates all file paths
  • Invisible character stripping — removes zero-width Unicode that could hide prompt injection
  • Content boundary markers — wraps web-sourced data to distinguish data from instructions

Localhost navigation is blocked by default. Set SCOUT_ALLOW_LOCALHOST=1 to enable it for local development.


Tools

Tool Description
launch_session Open a browser (headed or headless, optional proxy)
scout_page_tool Structural page overview: iframes, shadow DOM, element counts
find_elements Search for elements by text, type, or CSS selector
execute_action_tool Click, type, select, navigate, scroll, hover, wait
fill_secret Type credentials from .env without exposing them in conversation
get_2fa_code Retrieve a 2FA OTP code from Twilio SMS
execute_javascript Run arbitrary JS in the page context
take_screenshot_tool Capture the page as PNG or JPEG
inspect_element_tool Deep-inspect visibility, overlays, shadow DOM, ARIA
process_download Convert and move downloaded files
get_session_history Export the full session as a structured workflow log
monitor_network Watch HTTP traffic to discover API endpoints under the UI
record_video Record the browser session as MP4
close_session Close the browser and release resources
schedule_create Create an OS-level scheduled task
schedule_list List scheduled tasks
schedule_delete Remove a scheduled task

Workflow Export

Walk through a workflow conversationally, then export it as a standalone Python script:

workflows/<name>/
├── <name>.py              # Standalone replay script
├── <name>.json            # Portable workflow definition
├── requirements.txt
└── .env.example           # Credential template

Schedule exported workflows with the schedule_create tool — works on Windows (Task Scheduler), macOS (launchd), and Linux (cron).


Development

# Clone and install
git clone https://github.com/stemado/scout-mcp.git
cd scout
uv sync

# Run tests (no browser needed)
uv run pytest tests/ -m "not integration" -v

# Run integration tests (needs Chrome)
uv run pytest tests/ -v

# Run the MCP server locally
uv run scout-mcp-server

License

MIT

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

scout_mcp_server-1.1.0.tar.gz (13.4 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

scout_mcp_server-1.1.0-py3-none-any.whl (81.9 kB view details)

Uploaded Python 3

File details

Details for the file scout_mcp_server-1.1.0.tar.gz.

File metadata

  • Download URL: scout_mcp_server-1.1.0.tar.gz
  • Upload date:
  • Size: 13.4 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for scout_mcp_server-1.1.0.tar.gz
Algorithm Hash digest
SHA256 6bc5cf99f52b817011d02d6c2e3b6cdd0f41a5115e28a258349bd2dbed6cc1eb
MD5 f400d16b4ccde8ee58191d384b263e81
BLAKE2b-256 49b27c049e4cadde9dd800e2c17922d05ec16d2565f16b1bb5f49306a65a9dd9

See more details on using hashes here.

Provenance

The following attestation bundles were made for scout_mcp_server-1.1.0.tar.gz:

Publisher: release.yml on stemado/scout-mcp

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file scout_mcp_server-1.1.0-py3-none-any.whl.

File metadata

File hashes

Hashes for scout_mcp_server-1.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 ea10249ea75cc350c4a775070d409437ce1ff4adf659d2e4eb7725039e938966
MD5 6ea1bf303d4a04f05021d913f8a1d195
BLAKE2b-256 04926ee50b7495a523f99950c8bdac9b5f81040bcaebf886223c205268952877

See more details on using hashes here.

Provenance

The following attestation bundles were made for scout_mcp_server-1.1.0-py3-none-any.whl:

Publisher: release.yml on stemado/scout-mcp

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page