@ulpi/browse

browse-stealth skill

Anti-detection browsing with camoufox — Turnstile bypass, Google anti-bot evasion, authenticated sessions, and proxy rotation.

Install

npx skills add https://github.com/ulpi-io/skills --skill browse-stealth

Requires camoufox:

npm install camoufox-js
npx camoufox-js fetch

Trigger

/browse-stealth <url> — or invoked automatically when the agent detects:

  • CAPTCHA or "verify you are human" challenges
  • Blank, 403, or challenge pages instead of content
  • Google "unusual traffic" blocks
  • Sites using Cloudflare, DataDome, PerimeterX, or similar bot protection

Do not use for sites that load fine with regular browse — camoufox is slower to start.

What it does

A full anti-detection workflow using the camoufox runtime (Firefox with C++ fingerprint spoofing). Covers five scenarios:

  1. Setup via /browse-config — generates a camoufox profile (stealth, Google-safe, fast, or custom)
  2. Launch with camoufoxbrowse --runtime camoufox --camoufox-profile <name> goto <url>
  3. Cloudflare Turnstile bypass — wait for auto-resolve with humanize: true, or click the checkbox with @ref
  4. Google anti-bot evasiongeoip: true, humanize: true, randomized os fingerprint
  5. Authenticated sessions — combine --profile (persistent Chromium profile) with camoufox for login state
  6. Proxy rotation — multiple camoufox profiles with different proxy endpoints; switch via browse stop + relaunch

Key rules

  • --camoufox-profile is server-spawn-only. To switch profiles, run browse stop first.
  • humanize adds random delays to clicks and typing. Higher values = slower, more human-like.
  • geoip spoofs timezone, locale, and geolocation based on the exit IP.
  • IP reputation still matters — fingerprint spoofing alone doesn't bypass blacklisted IPs. Use residential proxies for heavily protected sites.

On this page