{
  "schemaVersion": "1.0",
  "item": {
    "slug": "b0tresch-stealth-browser",
    "name": "B0tresch Stealth Browser",
    "source": "tencent",
    "type": "skill",
    "category": "通讯协作",
    "sourceUrl": "https://clawhub.ai/b0tresch/b0tresch-stealth-browser",
    "canonicalUrl": "https://clawhub.ai/b0tresch/b0tresch-stealth-browser",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadMode": "redirect",
    "downloadUrl": "/downloads/b0tresch-stealth-browser",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=b0tresch-stealth-browser",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "installMethod": "Manual import",
    "extraction": "Extract archive",
    "prerequisites": [
      "OpenClaw"
    ],
    "packageFormat": "ZIP package",
    "includedAssets": [
      "SKILL.md",
      "_meta.json",
      "package-lock.json",
      "package.json",
      "scripts/browser.js"
    ],
    "primaryDoc": "SKILL.md",
    "quickSetup": [
      "Download the package from Yavira.",
      "Extract the archive and review SKILL.md first.",
      "Import or place the package into your OpenClaw setup."
    ],
    "agentAssist": {
      "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
      "steps": [
        "Download the package from Yavira.",
        "Extract it into a folder your agent can access.",
        "Paste one of the prompts below and point your agent at the extracted folder."
      ],
      "prompts": [
        {
          "label": "New install",
          "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
        },
        {
          "label": "Upgrade existing",
          "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
        }
      ]
    },
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-23T16:43:11.935Z",
      "expiresAt": "2026-04-30T16:43:11.935Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
        "contentDisposition": "attachment; filename=\"4claw-imageboard-1.0.1.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/b0tresch-stealth-browser"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    },
    "downloadPageUrl": "https://openagent3.xyz/downloads/b0tresch-stealth-browser",
    "agentPageUrl": "https://openagent3.xyz/skills/b0tresch-stealth-browser/agent",
    "manifestUrl": "https://openagent3.xyz/skills/b0tresch-stealth-browser/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/b0tresch-stealth-browser/agent.md"
  },
  "agentAssist": {
    "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
    "steps": [
      "Download the package from Yavira.",
      "Extract it into a folder your agent can access.",
      "Paste one of the prompts below and point your agent at the extracted folder."
    ],
    "prompts": [
      {
        "label": "New install",
        "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
      },
      {
        "label": "Upgrade existing",
        "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
      }
    ]
  },
  "documentation": {
    "source": "clawhub",
    "primaryDoc": "SKILL.md",
    "sections": [
      {
        "title": "Stealth Browser",
        "body": "Bypass bot detection and IP blocks with puppeteer-extra stealth plugin and optional Smartproxy residential proxy support."
      },
      {
        "title": "When to Use",
        "body": "Websites blocking headless browsers or datacenter IPs\nCloudflare/Vercel protection bypassing\nSites detecting automation (Reddit, Twitter/X, signup flows, faucets)\nProtected content scraping\nWeb automation requiring human-like behavior"
      },
      {
        "title": "Tested Working On",
        "body": "✅ Relay.link (was blocked by Vercel, now works)\n✅ X/Twitter profiles\n✅ Bot detection tests (sannysoft.com)\n✅ Faucet sites with protection\n✅ Reddit (datacenter IP blocks)"
      },
      {
        "title": "Quick Start",
        "body": "# Basic usage (stealth only)\nnode scripts/browser.js \"https://example.com\"\n\n# With residential proxy (bypasses IP blocks)\nnode scripts/browser.js \"https://example.com\" --proxy\n\n# Screenshot\nnode scripts/browser.js \"https://example.com\" --proxy --screenshot output.png\n\n# Get HTML content\nnode scripts/browser.js \"https://example.com\" --proxy --html\n\n# Get text content\nnode scripts/browser.js \"https://example.com\" --proxy --text"
      },
      {
        "title": "1. Install Dependencies",
        "body": "cd /path/to/skill\nnpm install\n\nRequired packages (automatically handled by npm install with included package.json):\n\npuppeteer-extra\npuppeteer-extra-plugin-stealth\npuppeteer"
      },
      {
        "title": "2. Configure Proxy (Optional but Recommended)",
        "body": "For bypassing IP-based blocks, set up Smartproxy residential proxy:\n\nCreate ~/.config/smartproxy/proxy.json:\n\n{\n  \"host\": \"proxy.smartproxy.net\",\n  \"port\": \"3120\",\n  \"username\": \"smart-ppz3iii4l2qr_area-US_life-30_session-xxxxx\",\n  \"password\": \"your-password\"\n}\n\nGet credentials from Smartproxy dashboard: https://dashboard.smartproxy.com\n\nSmartproxy session parameters:\n\n_area-US → Use US residential IPs\n_life-30 → Session lasts 30 minutes\n_session-xxxxx → Sticky session (same IP for duration)\n\nWithout proxy, the browser still uses stealth plugin to avoid detection, but may be blocked by IP-based protection."
      },
      {
        "title": "Stealth Features",
        "body": "The browser includes multiple anti-detection measures:\n\npuppeteer-extra-plugin-stealth: Automatically applies all stealth evasions\n\nRemoves navigator.webdriver flag\nSpoofs Chrome user agent and headers\nFakes plugins, languages, permissions\nRemoves automation signatures\n\n\n\nHuman-like behaviors:\n\nRealistic viewport (1920x1080)\nUpdated user agent (Chrome 121)\nNatural browser properties\nNo automation control flags\n\n\n\nResidential proxy (when --proxy used):\n\nRoutes through residential IPs\nBypasses datacenter IP blocks\nSticky sessions (same IP per session)\nGeographic targeting (US by default)"
      },
      {
        "title": "Detection Bypass Comparison",
        "body": "ProtectionHeadless PuppeteerStealth Plugin+ Residential Proxynavigator.webdriver❌ Detected✅ Hidden✅ HiddenUser Agent❌ Generic✅ Realistic✅ RealisticWebGL/Canvas❌ Headless✅ Spoofed✅ SpoofedIP Blocks❌ Datacenter❌ Datacenter✅ ResidentialCloudflare❌ Blocked⚠️  Sometimes✅ Usually worksTurnstile CAPTCHA❌ Blocked❌ Blocked⚠️  Reduced chance"
      },
      {
        "title": "Example 1: Check if Site Detects Automation",
        "body": "# Test on bot detection site\nnode scripts/browser.js \"https://bot.sannysoft.com\" --screenshot detection.png\n\nLook for green checkmarks = undetected, red = detected."
      },
      {
        "title": "Example 2: Scrape Protected Page",
        "body": "# Get page text content\nnode scripts/browser.js \"https://protected-site.com\" --proxy --text > output.txt"
      },
      {
        "title": "Example 3: Monitor Site Changes",
        "body": "# Take daily screenshot for comparison\nnode scripts/browser.js \"https://target-site.com\" --proxy --screenshot \"$(date +%Y-%m-%d).png\""
      },
      {
        "title": "Example 4: Extract Structured Data",
        "body": "import { browse } from './scripts/browser.js';\n\nconst result = await browse('https://example.com', {\n  proxy: true,\n  html: true\n});\n\n// Parse result.html with cheerio or similar\nconsole.log(result.html);"
      },
      {
        "title": "Proxy Cost Considerations",
        "body": "Smartproxy residential pricing:\n\n~$7.50/GB of traffic\nAverage page load: 1-3 MB\nRough cost: $0.01-0.03 per page\n\nWhen to use proxy:\n\nSite explicitly blocks datacenter IPs (Reddit, some faucets)\nCloudflare/Vercel protection detected\nMultiple requests from same IP getting rate-limited\nGeographic targeting needed (US vs international)\n\nWhen stealth-only is enough:\n\nSite only checks for automation signatures, not IP\nLow-value scraping where IP blocks are acceptable\nTesting/development (proxy costs add up)"
      },
      {
        "title": "Browser Launch Fails",
        "body": "Error: Failed to launch the browser process\n\nSolution: Install required system dependencies:\n\n# Debian/Ubuntu\nsudo apt-get install -y gconf-service libasound2 libatk1.0-0 libc6 libcairo2 \\\n  libcups2 libdbus-1-3 libexpat1 libfontconfig1 libgcc1 libgconf-2-4 \\\n  libgdk-pixbuf2.0-0 libglib2.0-0 libgtk-3-0 libnspr4 libpango-1.0-0 \\\n  libpangocairo-1.0-0 libstdc++6 libx11-6 libx11-xcb1 libxcb1 \\\n  libxcomposite1 libxcursor1 libxdamage1 libxext6 libxfixes3 libxi6 \\\n  libxrandr2 libxrender1 libxss1 libxtst6 ca-certificates fonts-liberation \\\n  libappindicator1 libnss3 lsb-release xdg-utils wget"
      },
      {
        "title": "Proxy Authentication Fails",
        "body": "Error: net::ERR_PROXY_AUTH_REQUESTED\n\nSolution: Check proxy credentials in ~/.config/smartproxy/proxy.json. Verify username/password are correct in Smartproxy dashboard."
      },
      {
        "title": "Still Getting Detected",
        "body": "Try these:\n\nUpdate session ID in proxy username (forces new IP):\n\"username\": \"smart-ppz3iii4l2qr_area-US_life-30_session-NEW_RANDOM_STRING\"\n\n\n\nIncrease wait time before interacting with page:\nawait page.goto(url, { waitUntil: 'networkidle2' });\nawait page.waitForTimeout(5000); // Wait 5s\n\n\n\nCheck detection test:\nnode scripts/browser.js \"https://bot.sannysoft.com\" --proxy --screenshot test.png\n\n\n\nTry different geographic area (if specific region is blocked):\n\"username\": \"smart-ppz3iii4l2qr_area-GB_life-30_session-xxxxx\""
      },
      {
        "title": "Limitations",
        "body": "CAPTCHAs: Stealth reduces but doesn't eliminate CAPTCHA challenges. For CAPTCHA solving, combine with 2captcha service.\nJavaScript fingerprinting: Advanced fingerprinting (Canvas, WebGL hash analysis) may still detect automation on highly protected sites.\nCost: Residential proxy adds per-request cost. Use strategically.\nSpeed: Proxy routing and stealth evasions add latency vs direct requests."
      },
      {
        "title": "Security Notes",
        "body": "Capabilities: This skill is read-only — it fetches web pages, captures screenshots, and extracts text/HTML. It does not perform any financial operations, value transfers, or wallet interactions.\n\nAuthentication: Proxy credentials are used solely for routing HTTP traffic through residential IPs. They do not grant access to any financial accounts or value-bearing systems.\n\nProxy credentials contain sensitive auth tokens. Keep ~/.config/smartproxy/proxy.json with 600 permissions.\nNever commit proxy credentials to git repositories.\nResidential proxy traffic is routed through real residential IPs. Respect rate limits and terms of service.\nNo value-transfer risk: this tool cannot send transactions, move funds, or interact with smart contracts."
      },
      {
        "title": "See Also",
        "body": "2captcha skill: For solving CAPTCHAs when stealth isn't enough\nSmartproxy dashboard: https://dashboard.smartproxy.com for usage monitoring\nBot detection test: https://bot.sannysoft.com to verify stealth effectiveness"
      }
    ],
    "body": "Stealth Browser\n\nBypass bot detection and IP blocks with puppeteer-extra stealth plugin and optional Smartproxy residential proxy support.\n\nWhen to Use\nWebsites blocking headless browsers or datacenter IPs\nCloudflare/Vercel protection bypassing\nSites detecting automation (Reddit, Twitter/X, signup flows, faucets)\nProtected content scraping\nWeb automation requiring human-like behavior\nTested Working On\n\n✅ Relay.link (was blocked by Vercel, now works) ✅ X/Twitter profiles ✅ Bot detection tests (sannysoft.com) ✅ Faucet sites with protection ✅ Reddit (datacenter IP blocks)\n\nQuick Start\n# Basic usage (stealth only)\nnode scripts/browser.js \"https://example.com\"\n\n# With residential proxy (bypasses IP blocks)\nnode scripts/browser.js \"https://example.com\" --proxy\n\n# Screenshot\nnode scripts/browser.js \"https://example.com\" --proxy --screenshot output.png\n\n# Get HTML content\nnode scripts/browser.js \"https://example.com\" --proxy --html\n\n# Get text content\nnode scripts/browser.js \"https://example.com\" --proxy --text\n\nSetup\n1. Install Dependencies\ncd /path/to/skill\nnpm install\n\n\nRequired packages (automatically handled by npm install with included package.json):\n\npuppeteer-extra\npuppeteer-extra-plugin-stealth\npuppeteer\n2. Configure Proxy (Optional but Recommended)\n\nFor bypassing IP-based blocks, set up Smartproxy residential proxy:\n\nCreate ~/.config/smartproxy/proxy.json:\n\n{\n  \"host\": \"proxy.smartproxy.net\",\n  \"port\": \"3120\",\n  \"username\": \"smart-ppz3iii4l2qr_area-US_life-30_session-xxxxx\",\n  \"password\": \"your-password\"\n}\n\n\nGet credentials from Smartproxy dashboard: https://dashboard.smartproxy.com\n\nSmartproxy session parameters:\n\n_area-US → Use US residential IPs\n_life-30 → Session lasts 30 minutes\n_session-xxxxx → Sticky session (same IP for duration)\n\nWithout proxy, the browser still uses stealth plugin to avoid detection, but may be blocked by IP-based protection.\n\nHow It Works\nStealth Features\n\nThe browser includes multiple anti-detection measures:\n\npuppeteer-extra-plugin-stealth: Automatically applies all stealth evasions\n\nRemoves navigator.webdriver flag\nSpoofs Chrome user agent and headers\nFakes plugins, languages, permissions\nRemoves automation signatures\n\nHuman-like behaviors:\n\nRealistic viewport (1920x1080)\nUpdated user agent (Chrome 121)\nNatural browser properties\nNo automation control flags\n\nResidential proxy (when --proxy used):\n\nRoutes through residential IPs\nBypasses datacenter IP blocks\nSticky sessions (same IP per session)\nGeographic targeting (US by default)\nDetection Bypass Comparison\nProtection\tHeadless Puppeteer\tStealth Plugin\t+ Residential Proxy\nnavigator.webdriver\t❌ Detected\t✅ Hidden\t✅ Hidden\nUser Agent\t❌ Generic\t✅ Realistic\t✅ Realistic\nWebGL/Canvas\t❌ Headless\t✅ Spoofed\t✅ Spoofed\nIP Blocks\t❌ Datacenter\t❌ Datacenter\t✅ Residential\nCloudflare\t❌ Blocked\t⚠️ Sometimes\t✅ Usually works\nTurnstile CAPTCHA\t❌ Blocked\t❌ Blocked\t⚠️ Reduced chance\nUsage Examples\nExample 1: Check if Site Detects Automation\n# Test on bot detection site\nnode scripts/browser.js \"https://bot.sannysoft.com\" --screenshot detection.png\n\n\nLook for green checkmarks = undetected, red = detected.\n\nExample 2: Scrape Protected Page\n# Get page text content\nnode scripts/browser.js \"https://protected-site.com\" --proxy --text > output.txt\n\nExample 3: Monitor Site Changes\n# Take daily screenshot for comparison\nnode scripts/browser.js \"https://target-site.com\" --proxy --screenshot \"$(date +%Y-%m-%d).png\"\n\nExample 4: Extract Structured Data\nimport { browse } from './scripts/browser.js';\n\nconst result = await browse('https://example.com', {\n  proxy: true,\n  html: true\n});\n\n// Parse result.html with cheerio or similar\nconsole.log(result.html);\n\nProxy Cost Considerations\n\nSmartproxy residential pricing:\n\n~$7.50/GB of traffic\nAverage page load: 1-3 MB\nRough cost: $0.01-0.03 per page\n\nWhen to use proxy:\n\nSite explicitly blocks datacenter IPs (Reddit, some faucets)\nCloudflare/Vercel protection detected\nMultiple requests from same IP getting rate-limited\nGeographic targeting needed (US vs international)\n\nWhen stealth-only is enough:\n\nSite only checks for automation signatures, not IP\nLow-value scraping where IP blocks are acceptable\nTesting/development (proxy costs add up)\nTroubleshooting\nBrowser Launch Fails\nError: Failed to launch the browser process\n\n\nSolution: Install required system dependencies:\n\n# Debian/Ubuntu\nsudo apt-get install -y gconf-service libasound2 libatk1.0-0 libc6 libcairo2 \\\n  libcups2 libdbus-1-3 libexpat1 libfontconfig1 libgcc1 libgconf-2-4 \\\n  libgdk-pixbuf2.0-0 libglib2.0-0 libgtk-3-0 libnspr4 libpango-1.0-0 \\\n  libpangocairo-1.0-0 libstdc++6 libx11-6 libx11-xcb1 libxcb1 \\\n  libxcomposite1 libxcursor1 libxdamage1 libxext6 libxfixes3 libxi6 \\\n  libxrandr2 libxrender1 libxss1 libxtst6 ca-certificates fonts-liberation \\\n  libappindicator1 libnss3 lsb-release xdg-utils wget\n\nProxy Authentication Fails\nError: net::ERR_PROXY_AUTH_REQUESTED\n\n\nSolution: Check proxy credentials in ~/.config/smartproxy/proxy.json. Verify username/password are correct in Smartproxy dashboard.\n\nStill Getting Detected\n\nTry these:\n\nUpdate session ID in proxy username (forces new IP):\n\n\"username\": \"smart-ppz3iii4l2qr_area-US_life-30_session-NEW_RANDOM_STRING\"\n\n\nIncrease wait time before interacting with page:\n\nawait page.goto(url, { waitUntil: 'networkidle2' });\nawait page.waitForTimeout(5000); // Wait 5s\n\n\nCheck detection test:\n\nnode scripts/browser.js \"https://bot.sannysoft.com\" --proxy --screenshot test.png\n\n\nTry different geographic area (if specific region is blocked):\n\n\"username\": \"smart-ppz3iii4l2qr_area-GB_life-30_session-xxxxx\"\n\nLimitations\nCAPTCHAs: Stealth reduces but doesn't eliminate CAPTCHA challenges. For CAPTCHA solving, combine with 2captcha service.\nJavaScript fingerprinting: Advanced fingerprinting (Canvas, WebGL hash analysis) may still detect automation on highly protected sites.\nCost: Residential proxy adds per-request cost. Use strategically.\nSpeed: Proxy routing and stealth evasions add latency vs direct requests.\nSecurity Notes\n\nCapabilities: This skill is read-only — it fetches web pages, captures screenshots, and extracts text/HTML. It does not perform any financial operations, value transfers, or wallet interactions.\n\nAuthentication: Proxy credentials are used solely for routing HTTP traffic through residential IPs. They do not grant access to any financial accounts or value-bearing systems.\n\nProxy credentials contain sensitive auth tokens. Keep ~/.config/smartproxy/proxy.json with 600 permissions.\nNever commit proxy credentials to git repositories.\nResidential proxy traffic is routed through real residential IPs. Respect rate limits and terms of service.\nNo value-transfer risk: this tool cannot send transactions, move funds, or interact with smart contracts.\nSee Also\n2captcha skill: For solving CAPTCHAs when stealth isn't enough\nSmartproxy dashboard: https://dashboard.smartproxy.com for usage monitoring\nBot detection test: https://bot.sannysoft.com to verify stealth effectiveness"
  },
  "trust": {
    "sourceLabel": "tencent",
    "provenanceUrl": "https://clawhub.ai/b0tresch/b0tresch-stealth-browser",
    "publisherUrl": "https://clawhub.ai/b0tresch/b0tresch-stealth-browser",
    "owner": "b0tresch",
    "version": "1.1.0",
    "license": null,
    "verificationStatus": "Indexed source record"
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/b0tresch-stealth-browser",
    "downloadUrl": "https://openagent3.xyz/downloads/b0tresch-stealth-browser",
    "agentUrl": "https://openagent3.xyz/skills/b0tresch-stealth-browser/agent",
    "manifestUrl": "https://openagent3.xyz/skills/b0tresch-stealth-browser/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/b0tresch-stealth-browser/agent.md"
  }
}