launch_browser
Launch an anti-detection browser for JavaScript reverse engineering, enabling dynamic debugging and network interception while bypassing bot detection mechanisms.
Instructions
Launch the Camoufox anti-detection browser.
Args: headless: Run in headless mode (default False for debugging visibility). os_type: OS fingerprint to emulate - "auto" (detect host OS), "windows", "macos", or "linux". Using "auto" ensures CJK fonts render correctly on the host system. locale: Browser locale such as "zh-CN", "en-US". Defaults to "auto" which detects the system locale. Affects Accept-Language headers and content language preferences. proxy: Proxy server URL (e.g. "http://127.0.0.1:7890"). humanize: Enable humanized mouse movement to mimic real users. geoip: Auto-infer geolocation from proxy IP. block_images: Block image loading for faster page loads. block_webrtc: Block WebRTC to prevent IP leaks.
Returns: dict with status, headless flag, os type, locale, and page list. If browser is already running, returns full session state including active page, page URLs, context list, and capture status.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| headless | No | ||
| os_type | No | auto | |
| locale | No | auto | |
| proxy | No | ||
| humanize | No | ||
| geoip | No | ||
| block_images | No | ||
| block_webrtc | No |