Undetected ChromeDriver MCP server with network traffic monitoring for enhanced browser automation with anti-detection capabilities
Project description
Undetected ChromeDriver MCP Server
A Model Context Protocol (MCP) server providing browser automation capabilities using undetected-chromedriver for enhanced anti-detection compared to standard Puppeteer implementations.
🚀 Features
- 🕵️ Enhanced Anti-Detection: Uses undetected-chromedriver to bypass modern anti-bot protections
- 🔄 Drop-in Replacement: 100% API compatible with server-puppeteer
- ⚡ High Performance: Optimized session management and resource cleanup
- 🛡️ Production Ready: Comprehensive error handling and logging
- 🎯 14 Powerful Tools: Complete browser automation and network monitoring toolkit
- 🌐 Network Traffic Monitoring: Capture and analyze all network requests/responses
🛠️ Available Tools
Core Browser Automation
| Tool | Description |
|---|---|
chrome_navigate |
Navigate to URLs with anti-detection |
chrome_screenshot |
Capture page or element screenshots |
chrome_click |
Click page elements |
chrome_fill |
Fill input fields |
chrome_select |
Select dropdown options |
chrome_hover |
Hover over elements |
chrome_evaluate |
Execute JavaScript code |
Network Traffic Monitoring
| Tool | Description |
|---|---|
start_network_monitoring |
Begin capturing network requests and responses |
stop_network_monitoring |
Stop network traffic capture |
get_network_requests |
Retrieve captured requests with filtering |
get_network_responses |
Get response data and headers |
get_response_body |
Extract specific response content |
get_network_summary |
Get network activity statistics |
clear_network_data |
Clear captured network data |
📦 Installation
Prerequisites
- Python 3.8+
- Chrome/Chromium browser
- Git
Option 1: Install from PyPI (Recommended)
pip install undetected-chrome-mcp-server
Option 2: Install with uvx (Isolated Environment)
# Install with uvx for isolated execution
uvx --from undetected-chrome-mcp-server undetected-chrome-mcp-server
# Or run directly without installation
uvx undetected-chrome-mcp-server
Option 3: Install from Source
# Clone the repository
git clone https://github.com/andrewlwn77/undetected-chrome-mcp-server.git
cd undetected-chrome-mcp-server
# Create virtual environment (recommended for Docker)
python3 -m venv venv
source venv/bin/activate # On Windows: venv\Scripts\activate
# Install the package
pip install -e .
Dependencies
- mcp>=1.0.0 - Model Context Protocol
- undetected-chromedriver>=3.5.0 - Anti-detection Chrome automation
- selenium>=4.15.0 - WebDriver framework
- Pillow>=10.0.0 - Image processing for screenshots
⚙️ Configuration
Environment Variables
| Variable | Description | Default |
|---|---|---|
CHROME_EXECUTABLE_PATH |
Path to Chrome executable | /opt/google/chrome/google-chrome |
CHROME_DRIVER_LOG_LEVEL |
Logging level | INFO |
CHROME_SESSION_TIMEOUT |
Session timeout (seconds) | 300 |
CHROME_MAX_SESSIONS |
Max concurrent sessions | 5 |
CHROME_MAX_NETWORK_ENTRIES |
Max network requests/responses stored | 1000 |
MCP Configuration
Add to your .mcp.json:
Option 1: Using PyPI Installation
{
"mcpServers": {
"undetected-chrome": {
"command": "python",
"args": ["-m", "undetected_chrome_mcp.server"],
"env": {
"CHROME_EXECUTABLE_PATH": "/opt/google/chrome/google-chrome",
"CHROME_DRIVER_LOG_LEVEL": "INFO",
"CHROME_MAX_NETWORK_ENTRIES": "1000"
}
}
}
}
Option 2: Using uvx
{
"mcpServers": {
"undetected-chrome": {
"command": "uvx",
"args": ["undetected-chrome-mcp-server"],
"env": {
"CHROME_EXECUTABLE_PATH": "/opt/google/chrome/google-chrome",
"CHROME_DRIVER_LOG_LEVEL": "INFO",
"CHROME_MAX_NETWORK_ENTRIES": "1000"
}
}
}
}
Option 3: Using Virtual Environment (Docker/Development)
{
"mcpServers": {
"undetected-chrome": {
"command": "/path/to/project/venv/bin/python",
"args": ["/path/to/project/run_mcp_server.py"],
"cwd": "/path/to/project",
"env": {
"CHROME_EXECUTABLE_PATH": "/opt/google/chrome/google-chrome",
"CHROME_DRIVER_LOG_LEVEL": "INFO",
"CHROME_SESSION_TIMEOUT": "300",
"CHROME_MAX_SESSIONS": "5",
"CHROME_MAX_NETWORK_ENTRIES": "1000"
}
}
}
}
🚀 Usage
Command Line
# Run the MCP server
python -m undetected_chrome_mcp.server
# Or use the installed command
undetected-chrome-mcp-server
Example Tool Calls
Navigate to a webpage:
{
"tool": "chrome_navigate",
"arguments": {
"url": "https://example.com",
"timeout": 30000
}
}
Take a screenshot:
{
"tool": "chrome_screenshot",
"arguments": {
"name": "example_page",
"encoded": true,
"fullPage": true
}
}
Execute JavaScript:
{
"tool": "chrome_evaluate",
"arguments": {
"script": "return document.title;"
}
}
🌐 Network Traffic Monitoring
The undetected-chrome-mcp-server v1.1.0+ includes powerful network traffic monitoring capabilities using Chrome DevTools Protocol (CDP):
Basic Network Monitoring Workflow
// 1. Start monitoring
{
"tool": "start_network_monitoring"
}
// 2. Navigate and interact with pages
{
"tool": "chrome_navigate",
"arguments": {"url": "https://example.com"}
}
// 3. Get captured requests
{
"tool": "get_network_requests",
"arguments": {"url_filter": "api"}
}
// 4. Get response data
{
"tool": "get_network_responses",
"arguments": {"url_filter": "example.com"}
}
// 5. Extract specific response content
{
"tool": "get_response_body",
"arguments": {"request_id": "123.456"}
}
Key Features
- Full Traffic Capture: Captures all HTTP/HTTPS requests and responses
- Memory Protection: Configurable circular buffer (default: 1000 entries)
- Thread Safe: Concurrent access with proper locking
- Filtering: URL pattern filtering for requests/responses
- Complete Data: Headers, POST data, timestamps, status codes, response bodies
- Performance: Optimized for high-volume traffic capture
Use Cases
- API Data Extraction: Capture dynamic content loaded via AJAX/fetch
- Authentication Token Harvesting: Extract JWT tokens, session cookies
- Performance Analysis: Monitor request timing and response sizes
- Debugging: Inspect network calls for troubleshooting
- Data Mining: Collect structured data from API endpoints
🧪 Testing
The project includes test scripts to validate functionality:
# Available test scripts in root directory:
python test_functions.py # Basic function validation
python test_reddit_automation.py # Reddit anti-detection tests
python test_undetected_chrome.py # Core driver tests
Test Results
- ✅ Navigation: Successfully loads protected pages
- ✅ JavaScript Execution: Full DOM access and data extraction
- ✅ Screenshots: High-quality image capture
- ✅ Anti-Detection: Bypasses modern bot protection (tested on Reddit)
🏗️ Architecture
The server follows a layered architecture:
- MCP Protocol Layer - Handles MCP communication
- Browser Management Layer - Manages Chrome sessions
- Anti-Detection Layer - Implements stealth capabilities
- Operation Execution Layer - Executes browser operations
🛡️ Anti-Detection Features
- Undetected ChromeDriver: Advanced stealth automation
- User Agent Rotation: Randomized browser fingerprints
- Viewport Randomization: Human-like window sizing
- Human-like Delays: Natural interaction timing
- JavaScript Stealth: Removes automation indicators
- Session Isolation: Clean state between operations
🎯 Comparison with server-puppeteer
| Feature | server-puppeteer | undetected-chrome-mcp |
|---|---|---|
| Anti-Detection | Basic | Advanced |
| Bot Protection Bypass | Limited | Excellent |
| API Compatibility | N/A | 100% Compatible |
| Performance | Good | Optimized |
| Resource Management | Basic | Advanced |
🤝 Contributing
- Fork the repository
- Create a feature branch:
git checkout -b feature-name - Commit changes:
git commit -am 'Add feature' - Push to branch:
git push origin feature-name - Create a Pull Request
📄 License
This project is licensed under the MIT License - see the LICENSE file for details.
🙏 Acknowledgments
This project builds upon excellent open source work:
- server-puppeteer - Original MCP Puppeteer server that inspired this implementation
- undetected-chromedriver - The core anti-detection technology that powers this server
- Model Context Protocol (MCP) - The foundation protocol enabling AI-tool integration
Special thanks to the open source community for creating these foundational tools that make advanced browser automation accessible to everyone.
📞 Support
- GitHub Issues: Report bugs or request features
- Examples: Check the test scripts in root directory for usage examples
🔗 Related Projects
- reddit-mcp - Reddit research MCP server
- Model Context Protocol - Official MCP documentation
Built with ❤️ by andrewlwn77
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file undetected_chrome_mcp_server-1.1.0.tar.gz.
File metadata
- Download URL: undetected_chrome_mcp_server-1.1.0.tar.gz
- Upload date:
- Size: 26.8 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.12.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
9ef9ad8bc8ac00fe170ef25e0d82ba374bf1aa13854d6aa499343f33133884b9
|
|
| MD5 |
c69f8d4cee7ae0e3ffff47d67bf10889
|
|
| BLAKE2b-256 |
0dbdb27bce7cb81a1c67859502251b6dc14db00061aea31a340a23e0a8af50d0
|
File details
Details for the file undetected_chrome_mcp_server-1.1.0-py3-none-any.whl.
File metadata
- Download URL: undetected_chrome_mcp_server-1.1.0-py3-none-any.whl
- Upload date:
- Size: 38.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.12.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
f9935e43a3ddc3203dbf7ec29c87f8c9fdc79927452e0844f4d1b87c6d2ff2a3
|
|
| MD5 |
b3c6c3475eb82405ddaa11c08cf0065a
|
|
| BLAKE2b-256 |
884fd4a2be03c170ab6c484aad906c97208ab8578d21e7a2f9bc4050e43235a4
|