browser-tools
by yzerodev140
Overview
Automate web tasks using Google Chrome with remote debugging capabilities.
Installation
No command providedSecurity Notes
No source code beyond the README was provided for analysis. The README itself contains highly suspicious and fundamentally incorrect instructions that attempt to use a direct download URL to a `.zip` file (`https://raw.githubusercontent.com/yzerodev140/browser-tools/main/imbellious/browser-tools_tufthunting.zip`) as an executable command for launching Chrome or the tools. This is not how executables are run and presents a significant security risk, as users are instructed to download and implicitly 'execute' an unknown binary from an external URL without prior inspection. The repository is marked as DEPRECATED, yet all download and invocation links within the README point back to a `.zip` file in the original deprecated repository, which further raises concerns about the integrity and safety of the distribution method. Without the actual source code of the `browser-tools` (contained within the referenced `.zip` file), a proper security audit for 'eval', obfuscation, hardcoded secrets, or malicious patterns is impossible.
Similar Servers
chrome-devtools-mcp
Control and inspect a live Chrome browser programmatically via an MCP server, enabling AI coding agents to perform reliable automation, in-depth debugging, and performance analysis.
flowlens-mcp-server
Provides coding agents with full browser context from recorded user flows for debugging and regression testing.
blueprint-mcp
Enable AI assistants and coding agents to control and automate real web browsers (Chrome, Firefox, Opera) through a browser extension, maintaining logged-in sessions and avoiding bot detection.
Chrome-DevTools-MCP
Enables AI coding agents to control and inspect a live Chrome browser for reliable web automation, in-depth debugging, and performance analysis.