browse-stealth skill
Anti-detection browsing with camoufox — Turnstile bypass, Google anti-bot evasion, authenticated sessions, and proxy rotation.
Install
npx skills add https://github.com/ulpi-io/skills --skill browse-stealthRequires camoufox:
npm install camoufox-js
npx camoufox-js fetchTrigger
/browse-stealth <url> — or invoked automatically when the agent detects:
- CAPTCHA or "verify you are human" challenges
- Blank, 403, or challenge pages instead of content
- Google "unusual traffic" blocks
- Sites using Cloudflare, DataDome, PerimeterX, or similar bot protection
Do not use for sites that load fine with regular browse — camoufox is slower to start.
What it does
A full anti-detection workflow using the camoufox runtime (Firefox with C++ fingerprint spoofing). Covers five scenarios:
- Setup via /browse-config — generates a camoufox profile (stealth, Google-safe, fast, or custom)
- Launch with camoufox —
browse --runtime camoufox --camoufox-profile <name> goto <url> - Cloudflare Turnstile bypass — wait for auto-resolve with
humanize: true, or click the checkbox with@ref - Google anti-bot evasion —
geoip: true,humanize: true, randomizedosfingerprint - Authenticated sessions — combine
--profile(persistent Chromium profile) with camoufox for login state - Proxy rotation — multiple camoufox profiles with different proxy endpoints; switch via
browse stop+ relaunch
Key rules
--camoufox-profileis server-spawn-only. To switch profiles, runbrowse stopfirst.humanizeadds random delays to clicks and typing. Higher values = slower, more human-like.geoipspoofs timezone, locale, and geolocation based on the exit IP.- IP reputation still matters — fingerprint spoofing alone doesn't bypass blacklisted IPs. Use residential proxies for heavily protected sites.
Related
- browse-config — generate camoufox profiles interactively
- Runtimes & Providers guide — full Camoufox runtime docs
- browse.json camoufox section — all 26 options