Skip to main content
Glama

interceptor_camoufox_list

List active camoufox instances to view WebSocket URLs and JA3/JA4 TLS fingerprint details for traffic interception and modification.

Instructions

List all active camoufox instances with their wsUrl and fingerprint details.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault

No arguments

Implementation Reference

  • Tool handler for 'interceptor_camoufox_list'. Retrieves the CamoufoxInterceptor from interceptorManager, calls getMetadata(), and returns isActivable + activeTargets as JSON.
    server.tool(
      "interceptor_camoufox_list",
      "List all active camoufox instances with their wsUrl and fingerprint details.",
      {},
      async () => {
        try {
          const fox = interceptorManager.get("camoufox") as CamoufoxInterceptor | undefined;
          if (!fox) throw new Error("Camoufox interceptor not registered.");
          const meta = await fox.getMetadata();
          return {
            content: [{
              type: "text",
              text: JSON.stringify({
                status: "success",
                isActivable: meta.isActivable,
                targets: meta.activeTargets,
              }),
            }],
          };
        } catch (e) {
          return { content: [{ type: "text", text: JSON.stringify({ status: "error", error: errorToString(e) }) }] };
        }
      },
    );
  • The registerCamoufoxTools function registers all four camoufox tools (launch, info, list, close) with the MCP server via server.tool(). The 'interceptor_camoufox_list' tool is registered at line 155.
    export function registerCamoufoxTools(server: McpServer): void {
      server.tool(
        "interceptor_camoufox_launch",
        "Launch camoufox (anti-detect Firefox) as a Playwright WebSocket server, proxied through proxy-mcp with NSS CA trust. Returns a camoufox target_id, wsUrl, and safe fingerprint introspection; drive the target with interceptor_browser_* and humanizer_* tools, or use wsUrl for custom Playwright code. Requires `pip install cloverlabs-camoufox[geoip]` + `python3 -m camoufox fetch official/150.0.2-alpha.26` on the host (and `libnss3-tools` for cert trust).",
        {
          os: z.union([osEnum, z.array(osEnum)]).optional().describe("Fingerprint OS to emulate (default: host OS; pass an array to let Camoufox choose from those OS families)"),
          webgl_config: z.tuple([z.string(), z.string()]).optional().describe("[vendor, renderer] WebGL pair (must be valid for the chosen OS)"),
          fonts: z.array(z.string()).optional().describe("Extra font families to inject (must be installed on the host)"),
          config: z.record(z.unknown()).optional().describe("Raw camoufox config property overrides (advanced)"),
          humanize: z.union([z.boolean(), z.number().positive()]).optional().describe("true = humanize cursor; number = max seconds for cursor humanization"),
          headless: z.union([z.boolean(), z.literal("virtual")]).optional().default(true).describe("true (default), false, or 'virtual' (Xvfb on Linux)"),
          addons: z.array(z.string()).optional().describe("Paths to extracted Firefox addon directories"),
          main_world_eval: z.boolean().optional().describe("Allow explicit `world: 'main'` evaluate calls. On cloverlabs/FF150 this gates the call but does not create a separate realm."),
          enable_cache: z.boolean().optional().describe("Cache pages/requests (disabled by default)"),
          disable_coop: z.boolean().optional().describe("Disable COOP — needed for Cloudflare Turnstile iframes"),
          block_webrtc: z.boolean().optional().default(true).describe("Block WebRTC to prevent IP leaks (default true)"),
          block_webgl: z.boolean().optional().describe("Block WebGL entirely"),
          block_images: z.boolean().optional().describe("Block image requests (saves proxy bandwidth)"),
          locale: z.union([z.string(), z.array(z.string())]).optional().describe("BCP 47 locale or 2-letter country code"),
          geoip: z.union([z.boolean(), z.string()]).optional().default(true).describe("true (auto-detect from proxy IP), false, or explicit IP string"),
          port: z.number().optional().describe("Fixed WS server port (default: random)"),
          ws_path: z.string().optional().describe("Fixed WS URL path (default: random)"),
          python_executable: z.string().optional().default("python3").describe("Python executable for the launcher (e.g. 'uv run python3')"),
          trust_proxy_cert: z.boolean().optional().default(true).describe("Run certutil to inject the proxy CA into a fresh NSS profile (default true)"),
        },
        async (args) => {
          try {
            const proxyInfo = requireProxy();
            const result = await interceptorManager.activate("camoufox", { ...proxyInfo, ...args });
            const details = result.details as Record<string, unknown>;
            const fingerprint = asRecord(details.fingerprint);
            return {
              content: [{
                type: "text",
                text: JSON.stringify({
                  status: "success",
                  targetId: result.targetId,
                  wsUrl: details.wsUrl,
                  playwright_connect: details.playwright_connect,
                  fingerprint: {
                    ...fingerprint,
                    os: fingerprint.os ?? details.os ?? null,
                    humanize: details.humanize ?? null,
                    geoip: details.geoip ?? null,
                    locale: details.locale ?? null,
                    headless: details.headless ?? null,
                    block_webrtc: details.block_webrtc ?? null,
                  },
                  certutil: details.certutil ?? false,
                }),
              }],
            };
          } catch (e) {
            return { content: [{ type: "text", text: JSON.stringify({ status: "error", error: errorToString(e) }) }] };
          }
        },
      );
    
      server.tool(
        "interceptor_camoufox_info",
        "Get the wsUrl and ready-to-paste Playwright connect snippets (TS + Python) for a camoufox target.",
        {
          target_id: z.string().describe("Target ID from interceptor_camoufox_launch"),
        },
        async ({ target_id }) => {
          try {
            const fox = interceptorManager.get("camoufox") as CamoufoxInterceptor | undefined;
            if (!fox) throw new Error("Camoufox interceptor not registered.");
            const entry = fox.getEntry(target_id);
            if (!entry) throw new Error(`No camoufox instance with target ID '${target_id}'`);
            const wsUrl = entry.wsUrl;
            return {
              content: [{
                type: "text",
                text: JSON.stringify({
                  status: "success",
                  targetId: target_id,
                  wsUrl,
                  snippets: {
                    typescript: [
                      "import { firefox } from 'playwright-core';",
                      `const browser = await firefox.connect('${wsUrl}');`,
                      "const ctx = await browser.newContext();",
                      "const page = await ctx.newPage();",
                      "await page.goto('https://example.com');",
                    ].join("\n"),
                    python: [
                      "from playwright.sync_api import sync_playwright",
                      "with sync_playwright() as p:",
                      `    browser = p.firefox.connect('${wsUrl}')`,
                      "    page = browser.new_page()",
                      "    page.goto('https://example.com')",
                    ].join("\n"),
                  },
                  details: entry.target.details,
                }),
              }],
            };
          } catch (e) {
            return { content: [{ type: "text", text: JSON.stringify({ status: "error", error: errorToString(e) }) }] };
          }
        },
      );
    
      server.tool(
        "interceptor_camoufox_list",
        "List all active camoufox instances with their wsUrl and fingerprint details.",
        {},
        async () => {
          try {
            const fox = interceptorManager.get("camoufox") as CamoufoxInterceptor | undefined;
            if (!fox) throw new Error("Camoufox interceptor not registered.");
            const meta = await fox.getMetadata();
            return {
              content: [{
                type: "text",
                text: JSON.stringify({
                  status: "success",
                  isActivable: meta.isActivable,
                  targets: meta.activeTargets,
                }),
              }],
            };
          } catch (e) {
            return { content: [{ type: "text", text: JSON.stringify({ status: "error", error: errorToString(e) }) }] };
          }
        },
      );
    
      server.tool(
        "interceptor_camoufox_close",
        "Close a camoufox instance launched by interceptor_camoufox_launch. Kills the Python launcher, removes the temp launcher dir, and removes the NSS profile dir if one was created.",
        {
          target_id: z.string().describe("Target ID from interceptor_camoufox_launch"),
        },
        async ({ target_id }) => {
          try {
            await interceptorManager.deactivate("camoufox", target_id);
            return {
              content: [{
                type: "text",
                text: JSON.stringify({ status: "success", message: `Camoufox instance ${target_id} closed.` }),
              }],
            };
          } catch (e) {
            return { content: [{ type: "text", text: JSON.stringify({ status: "error", error: errorToString(e) }) }] };
          }
        },
      );
    }
  • CamoufoxInterceptor.getMetadata() — called by the list handler. Returns InterceptorMetadata with isActivable status and activeTargets (derived from the launched Map).
    async getMetadata(): Promise<InterceptorMetadata> {
      return {
        id: this.id,
        name: this.name,
        description:
          "Launch camoufox (anti-detect Firefox) as a Playwright WS server with proxy + NSS CA trust. " +
          "Defaults fingerprint generation to the host OS and returns safe fingerprint introspection. " +
          "Drive the returned target_id through the same `interceptor_browser_*` and `humanizer_*` " +
          "tools as cloakbrowser. Requires Python + `pip install cloverlabs-camoufox[geoip]`.",
        isActivable: await this.isActivable(),
        activeTargets: [...this.launched.values()].map((e) => e.target),
      };
    }
  • interceptorManager.get('camoufox') — used by the list handler to retrieve the CamoufoxInterceptor instance by its ID.
    get(id: string): Interceptor | undefined {
      return this.interceptors.get(id);
    }
  • The tool has an empty schema {} (no input parameters), meaning it takes no arguments.
    server.tool(
      "interceptor_camoufox_list",
      "List all active camoufox instances with their wsUrl and fingerprint details.",
      {},
      async () => {
        try {
          const fox = interceptorManager.get("camoufox") as CamoufoxInterceptor | undefined;
          if (!fox) throw new Error("Camoufox interceptor not registered.");
          const meta = await fox.getMetadata();
          return {
            content: [{
              type: "text",
              text: JSON.stringify({
                status: "success",
                isActivable: meta.isActivable,
                targets: meta.activeTargets,
              }),
            }],
          };
        } catch (e) {
          return { content: [{ type: "text", text: JSON.stringify({ status: "error", error: errorToString(e) }) }] };
        }
      },
    );
Behavior3/5

Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?

With no annotations, the description carries full burden. It discloses the list of all active instances with specific details but does not mention potential side effects, authentication needs, or performance considerations. Basic transparency is adequate.

Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.

Conciseness5/5

Is the description appropriately sized, front-loaded, and free of redundancy?

One sentence of 10 words, no redundancy, perfectly concise while covering purpose and output details.

Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.

Completeness5/5

Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?

Given no parameters and no output schema, the description sufficiently explains the tool's function and return value. No missing information.

Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.

Parameters4/5

Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?

The tool has zero parameters, so the description does not need to clarify parameters. Baseline 4 applies as per guidelines.

Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.

Purpose5/5

Does the description clearly state what the tool does and how it differs from similar tools?

The description clearly states the verb 'List', the resource 'active camoufox instances', and the specific output details ('wsUrl and fingerprint details'). It distinguishes itself from sibling tools like interceptor_list or interceptor_camoufox_info.

Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.

Usage Guidelines2/5

Does the description explain when to use this tool, when not to, or what alternatives exist?

No guidance on when to use this tool versus alternatives such as interceptor_camoufox_info or interceptor_list. The description only states what it does without providing context for selection.

Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.

Install Server

Other Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/yfe404/proxy-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server