Skip to main content
Glama

interceptor_camoufox_launch

Launch an anti-detect Firefox browser as a Playwright WebSocket server, proxied through proxy-mcp with NSS CA trust, for stealth browsing and automation.

Instructions

Launch camoufox (anti-detect Firefox) as a Playwright WebSocket server, proxied through proxy-mcp with NSS CA trust. Returns a camoufox target_id, wsUrl, and safe fingerprint introspection; drive the target with interceptor_browser_* and humanizer_* tools, or use wsUrl for custom Playwright code. Requires pip install cloverlabs-camoufox[geoip] + python3 -m camoufox fetch official/150.0.2-alpha.26 on the host (and libnss3-tools for cert trust).

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
osNoFingerprint OS to emulate (default: host OS; pass an array to let Camoufox choose from those OS families)
webgl_configNo[vendor, renderer] WebGL pair (must be valid for the chosen OS)
fontsNoExtra font families to inject (must be installed on the host)
configNoRaw camoufox config property overrides (advanced)
humanizeNotrue = humanize cursor; number = max seconds for cursor humanization
headlessNotrue (default), false, or 'virtual' (Xvfb on Linux)
addonsNoPaths to extracted Firefox addon directories
main_world_evalNoAllow explicit `world: 'main'` evaluate calls. On cloverlabs/FF150 this gates the call but does not create a separate realm.
enable_cacheNoCache pages/requests (disabled by default)
disable_coopNoDisable COOP — needed for Cloudflare Turnstile iframes
block_webrtcNoBlock WebRTC to prevent IP leaks (default true)
block_webglNoBlock WebGL entirely
block_imagesNoBlock image requests (saves proxy bandwidth)
localeNoBCP 47 locale or 2-letter country code
geoipNotrue (auto-detect from proxy IP), false, or explicit IP string
portNoFixed WS server port (default: random)
ws_pathNoFixed WS URL path (default: random)
python_executableNoPython executable for the launcher (e.g. 'uv run python3')python3
trust_proxy_certNoRun certutil to inject the proxy CA into a fresh NSS profile (default true)
Behavior4/5

Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?

No annotations are provided, so the description carries the full burden. It clearly states the action (launch), the prerequisites, and the return values (target_id, wsUrl, fingerprint). It mentions the process type (WebSocket server) but does not detail side effects like concurrency limits or resource usage, which would improve transparency.

Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.

Conciseness4/5

Is the description appropriately sized, front-loaded, and free of redundancy?

The description is a single paragraph that front-loads the main action and then lists prerequisites and returns. It is reasonably concise but dense, combining multiple pieces of information without separation. It could be slightly more structured.

Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.

Completeness4/5

Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?

Given 19 parameters, no output schema, and no required params, the description is fairly complete. It explains the tool's purpose, prerequisites, and how to use the returned values with sibling tools. However, it does not provide examples or describe the exact structure of the return value.

Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.

Parameters3/5

Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?

Schema description coverage is 100%, so the baseline is 3. The description adds minimal value beyond the schema, providing only an overview. It does not elaborate on parameter interactions or provide additional context that is missing from the schema.

Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.

Purpose5/5

Does the description clearly state what the tool does and how it differs from similar tools?

The description clearly states the verb 'Launch camoufox (anti-detect Firefox)' and identifies the resource as a Playwright WebSocket server with proxy and NSS CA trust. It distinguishes from sibling interceptor_browser_launch by specifying anti-detect Firefox and linking to related tools.

Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.

Usage Guidelines4/5

Does the description explain when to use this tool, when not to, or what alternatives exist?

The description provides prerequisites (pip install, fetch, libnss3-tools) and suggests using interceptor_browser_* and humanizer_* tools to drive the target. It implicitly contrasts with interceptor_browser_launch but does not explicitly state when to avoid this tool or list alternatives.

Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.

Install Server

Other Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/yfe404/proxy-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server