โ† All skills
Tencent SkillHub ยท Developer Tools

Stealth Browser

Ultimate stealth browser automation with anti-detection, Cloudflare bypass, CAPTCHA solving, persistent sessions, and silent operation. Use for any web automation requiring bot detection evasion, login persistence, headless browsing, or bypassing security measures. Triggers on "bypass cloudflare", "solve captcha", "stealth browse", "silent automation", "persistent login", "anti-detection", or any task needing undetectable browser automation. When user asks to "login to X website", automatically use headed mode for login, then save session for future headless reuse.

skill openclawclawhub Free
0 Downloads
0 Stars
0 Installs
0 Score
High Signal

Ultimate stealth browser automation with anti-detection, Cloudflare bypass, CAPTCHA solving, persistent sessions, and silent operation. Use for any web automation requiring bot detection evasion, login persistence, headless browsing, or bypassing security measures. Triggers on "bypass cloudflare", "solve captcha", "stealth browse", "silent automation", "persistent login", "anti-detection", or any task needing undetectable browser automation. When user asks to "login to X website", automatically use headed mode for login, then save session for future headless reuse.

โฌ‡ 0 downloads โ˜… 0 stars Unverified but indexed

Install for OpenClaw

Item requires authentication.

This item appears to require sign-in or permission before the package can be fetched. Open the source page and confirm access manually.

Quick setup
  1. Open the source page and confirm the required access before downloading.
  2. Review SKILL.md after the source grants access.
  3. Treat the package as manual setup until the direct download works.

Requirements

Target platform
OpenClaw
Install method
Manual import
Extraction
Extract archive
Prerequisites
OpenClaw
Primary doc
SKILL.md

Package facts

Download mode
Manual review
Package format
ZIP package
Source platform
Tencent SkillHub
What's included
SKILL.md, scripts/cf_bypass.py, scripts/login_session.py, scripts/proxy_rotate.py, scripts/session_manager.py, scripts/smart_login.py

Validation

  • Sign in or confirm the required access before retrying the download.
  • Review SKILL.md after authentication succeeds.
  • Treat this source as manual setup until the package can be fetched directly.

Install with your agent

Agent handoff

Use the source page and any available docs to guide the install because the item requires authentication or permission before the package can be fetched.

  1. Open the source page via Open source page.
  2. If you can obtain the package, extract it into a folder your agent can access.
  3. Paste one of the prompts below and point your agent at the source page and extracted files.
New install

I tried to install a skill package from Yavira, but the item requires authentication or permission before the package can be fetched. Inspect the source page and any extracted docs, then tell me what you can confirm and any manual steps still required.

Upgrade existing

I tried to upgrade a skill package from Yavira, but the item requires authentication or permission before the package can be fetched. Compare the source page and any extracted docs with my current installation, then summarize what changed and what manual follow-up I still need.

Trust & source

Release facts

Source
Tencent SkillHub
Verification
Indexed source record
Version
1.0.0

Documentation

ClawHub primary doc Primary doc: SKILL.md 23 sections Open source page

Stealth Browser Automation

Silent, undetectable web automation combining multiple anti-detection layers.

Quick Login Workflow (IMPORTANT)

When user asks to login to any website: Open in headed mode (visible browser for manual login): python scripts/stealth_session.py -u "https://target.com/login" -s sitename --headed User logs in manually in the visible browser Save session after login confirmed: python scripts/stealth_session.py -u "https://target.com" -s sitename --headed --save Future use - load saved session (headless): python scripts/stealth_session.py -u "https://target.com" -s sitename --load Sessions stored in: ~/.clawdbot/browser-sessions/<sitename>.json

1. ๅ…ˆ้™้ป˜ๅŽๆ˜พ็คบ

ไผ˜ๅ…ˆไฝฟ็”จ headless ๆจกๅผ้™้ป˜ๅฐ่ฏ• ๅฆ‚ๆžœๅคฑ่ดฅๆˆ–้œ€่ฆ้ชŒ่ฏ็ ๏ผŒๅ†ๅˆ‡ๆขๅˆฐ headed ๆ˜พ็คบๆจกๅผ ้ฟๅ…ๆ‰“ๆ‰ฐ็”จๆˆทๆ“ไฝœ

2. ๆ–ญ็‚น็ปญไผ 

้•ฟไปปๅŠกไฝฟ็”จ task_runner.py ็ฎก็†็Šถๆ€๏ผš from task_runner import TaskRunner task = TaskRunner('my_task') task.set_total(100) for i in items: if task.is_completed(i): continue # ่ทณ่ฟ‡ๅทฒๅฎŒๆˆ # ๅค„็†... task.mark_completed(i) task.finish()

3. ่ถ…ๆ—ถๅค„็†

้ป˜่ฎคๅ•้กต่ถ…ๆ—ถ: 30็ง’ ้•ฟไปปๅŠกๆฏ50้กนไฟๅญ˜ไธ€ๆฌก่ฟ›ๅบฆ ๅคฑ่ดฅ่‡ชๅŠจ้‡่ฏ•3ๆฌก

4. ่ฎฐๅฝ•ๅฐ่ฏ•

ๆ‰€ๆœ‰็™ปๅฝ•ๅฐ่ฏ•่ฎฐๅฝ•ๅœจ: ~/.clawdbot/browser-sessions/attempts.json

Architecture

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ Stealth Browser โ”‚ โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค โ”‚ Layer 1: Anti-Detection Engine โ”‚ โ”‚ - puppeteer-extra-plugin-stealth โ”‚ โ”‚ - Browser fingerprint spoofing โ”‚ โ”‚ - WebGL/Canvas/Audio fingerprint masking โ”‚ โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค โ”‚ Layer 2: Challenge Bypass โ”‚ โ”‚ - Cloudflare Turnstile/JS Challenge โ”‚ โ”‚ - hCaptcha / reCAPTCHA integration โ”‚ โ”‚ - 2Captcha / Anti-Captcha API โ”‚ โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค โ”‚ Layer 3: Session Persistence โ”‚ โ”‚ - Cookie storage (JSON/SQLite) โ”‚ โ”‚ - localStorage sync โ”‚ โ”‚ - Multi-profile management โ”‚ โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค โ”‚ Layer 4: Proxy & Identity โ”‚ โ”‚ - Rotating residential proxies โ”‚ โ”‚ - User-Agent rotation โ”‚ โ”‚ - Timezone/Locale spoofing โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

Install Core Dependencies

npm install -g puppeteer-extra puppeteer-extra-plugin-stealth npm install -g playwright pip install undetected-chromedriver DrissionPage

Optional: CAPTCHA Solvers

Store API keys in ~/.clawdbot/secrets/captcha.json: { "2captcha": "YOUR_2CAPTCHA_KEY", "anticaptcha": "YOUR_ANTICAPTCHA_KEY", "capsolver": "YOUR_CAPSOLVER_KEY" }

Optional: Proxy Configuration

Store in ~/.clawdbot/secrets/proxies.json: { "rotating": "http://user:pass@proxy.provider.com:port", "residential": ["socks5://ip1:port", "socks5://ip2:port"], "datacenter": "http://dc-proxy:port" }

1. Stealth Session (Python - Recommended)

# scripts/stealth_session.py - use for maximum compatibility import undetected_chromedriver as uc from DrissionPage import ChromiumPage # Option A: undetected-chromedriver (Selenium-based) driver = uc.Chrome(headless=True, use_subprocess=True) driver.get("https://nowsecure.nl") # Test anti-detection # Option B: DrissionPage (faster, native Python) page = ChromiumPage() page.get("https://cloudflare-protected-site.com")

2. Stealth Session (Node.js)

// scripts/stealth.mjs import puppeteer from 'puppeteer-extra'; import StealthPlugin from 'puppeteer-extra-plugin-stealth'; puppeteer.use(StealthPlugin()); const browser = await puppeteer.launch({ headless: 'new', args: [ '--disable-blink-features=AutomationControlled', '--disable-dev-shm-usage', '--no-sandbox' ] }); const page = await browser.newPage(); await page.goto('https://bot.sannysoft.com'); // Verify stealth

Open Stealth Page

# Using agent-browser with stealth profile agent-browser --profile ~/.stealth-profile open https://target.com # Or via script python scripts/stealth_open.py --url "https://target.com" --headless

Bypass Cloudflare

# Automatic CF bypass with DrissionPage from DrissionPage import ChromiumPage page = ChromiumPage() page.get("https://cloudflare-site.com") # DrissionPage waits for CF challenge automatically # Manual wait if needed page.wait.ele_displayed("main-content", timeout=30) For stubborn Cloudflare sites, use FlareSolverr: # Start FlareSolverr container docker run -d --name flaresolverr -p 8191:8191 ghcr.io/flaresolverr/flaresolverr # Request clearance curl -X POST http://localhost:8191/v1 \ -H "Content-Type: application/json" \ -d '{"cmd":"request.get","url":"https://cf-protected.com","maxTimeout":60000}'

Solve CAPTCHAs

# scripts/solve_captcha.py import requests import json import time def solve_recaptcha(site_key, page_url, api_key): """Solve reCAPTCHA v2/v3 via 2Captcha""" # Submit task resp = requests.post("http://2captcha.com/in.php", data={ "key": api_key, "method": "userrecaptcha", "googlekey": site_key, "pageurl": page_url, "json": 1 }).json() task_id = resp["request"] # Poll for result for _ in range(60): time.sleep(3) result = requests.get(f"http://2captcha.com/res.php?key={api_key}&action=get&id={task_id}&json=1").json() if result["status"] == 1: return result["request"] # Token return None def solve_hcaptcha(site_key, page_url, api_key): """Solve hCaptcha via Anti-Captcha""" resp = requests.post("https://api.anti-captcha.com/createTask", json={ "clientKey": api_key, "task": { "type": "HCaptchaTaskProxyless", "websiteURL": page_url, "websiteKey": site_key } }).json() task_id = resp["taskId"] for _ in range(60): time.sleep(3) result = requests.post("https://api.anti-captcha.com/getTaskResult", json={ "clientKey": api_key, "taskId": task_id }).json() if result["status"] == "ready": return result["solution"]["gRecaptchaResponse"] return None

Persistent Sessions

# scripts/session_manager.py import json import os from pathlib import Path SESSIONS_DIR = Path.home() / ".clawdbot" / "browser-sessions" SESSIONS_DIR.mkdir(parents=True, exist_ok=True) def save_cookies(driver, session_name): """Save cookies to JSON""" cookies = driver.get_cookies() path = SESSIONS_DIR / f"{session_name}_cookies.json" path.write_text(json.dumps(cookies, indent=2)) return path def load_cookies(driver, session_name): """Load cookies from saved session""" path = SESSIONS_DIR / f"{session_name}_cookies.json" if path.exists(): cookies = json.loads(path.read_text()) for cookie in cookies: driver.add_cookie(cookie) return True return False def save_local_storage(page, session_name): """Save localStorage""" ls = page.evaluate("() => JSON.stringify(localStorage)") path = SESSIONS_DIR / f"{session_name}_localStorage.json" path.write_text(ls) return path def load_local_storage(page, session_name): """Restore localStorage""" path = SESSIONS_DIR / f"{session_name}_localStorage.json" if path.exists(): data = path.read_text() page.evaluate(f"(data) => {{ Object.entries(JSON.parse(data)).forEach(([k,v]) => localStorage.setItem(k,v)) }}", data) return True return False

Silent Automation Workflow

# Complete silent automation example from DrissionPage import ChromiumPage, ChromiumOptions # Configure for stealth options = ChromiumOptions() options.headless() options.set_argument('--disable-blink-features=AutomationControlled') options.set_argument('--disable-dev-shm-usage') options.set_user_agent('Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36') page = ChromiumPage(options) # Navigate with CF bypass page.get("https://target-site.com") # Wait for any challenges page.wait.doc_loaded() # Interact silently page.ele("@id=username").input("user@email.com") page.ele("@id=password").input("password123") page.ele("@type=submit").click() # Save session for reuse page.cookies.save("~/.clawdbot/browser-sessions/target-site.json")

Proxy Rotation

# scripts/proxy_rotate.py import random import json from pathlib import Path def get_proxy(): """Get random proxy from pool""" config = json.loads((Path.home() / ".clawdbot/secrets/proxies.json").read_text()) proxies = config.get("residential", []) return random.choice(proxies) if proxies else config.get("rotating") # Use with DrissionPage options = ChromiumOptions() options.set_proxy(get_proxy()) page = ChromiumPage(options)

User Input Required

To complete this skill, provide: CAPTCHA API Keys (optional but recommended): 2Captcha key: https://2captcha.com Anti-Captcha key: https://anti-captcha.com CapSolver key: https://capsolver.com Proxy Configuration (optional): Residential proxy provider credentials Or list of SOCKS5/HTTP proxies Target Sites (for pre-configured sessions): Which sites need login persistence? What credentials should be stored?

Files Structure

stealth-browser/ โ”œโ”€โ”€ SKILL.md โ”œโ”€โ”€ scripts/ โ”‚ โ”œโ”€โ”€ stealth_session.py # Main stealth browser wrapper โ”‚ โ”œโ”€โ”€ solve_captcha.py # CAPTCHA solving utilities โ”‚ โ”œโ”€โ”€ session_manager.py # Cookie/localStorage persistence โ”‚ โ”œโ”€โ”€ proxy_rotate.py # Proxy rotation โ”‚ โ””โ”€โ”€ cf_bypass.py # Cloudflare-specific bypass โ””โ”€โ”€ references/ โ”œโ”€โ”€ fingerprints.md # Browser fingerprint details โ””โ”€โ”€ detection-tests.md # Sites to test anti-detection

Testing Anti-Detection

# Run these to verify stealth is working: python scripts/stealth_open.py --url "https://bot.sannysoft.com" python scripts/stealth_open.py --url "https://nowsecure.nl" python scripts/stealth_open.py --url "https://arh.antoinevastel.com/bots/areyouheadless" python scripts/stealth_open.py --url "https://pixelscan.net"

Integration with agent-browser

For simple tasks, use agent-browser with a persistent profile: # Create stealth profile once agent-browser --profile ~/.stealth-profile --headed open https://login-site.com # Login manually, then close # Reuse authenticated session (headless) agent-browser --profile ~/.stealth-profile snapshot agent-browser --profile ~/.stealth-profile click @e5 For Cloudflare or CAPTCHA-heavy sites, use Python scripts instead.

Best Practices

Always use headless: 'new' not headless: true (less detectable) Rotate User-Agents matching browser version Add random delays between actions (100-500ms) Use residential proxies for sensitive targets Save sessions after successful login Test on bot.sannysoft.com before production use

Category context

Code helpers, APIs, CLIs, browser automation, testing, and developer operations.

Source: Tencent SkillHub

Largest current source with strong distribution and engagement signals.

Package contents

Included in package
5 Scripts1 Docs
  • SKILL.md Primary doc
  • scripts/cf_bypass.py Scripts
  • scripts/login_session.py Scripts
  • scripts/proxy_rotate.py Scripts
  • scripts/session_manager.py Scripts
  • scripts/smart_login.py Scripts