interceptor_chrome_launch
Launch Chrome with proxy configuration and certificate trust to intercept and analyze network traffic through a MITM proxy for debugging and testing.
Instructions
Launch Chrome/Chromium with proxy flags and SPKI certificate trust. Uses isolated temp profile. Traffic automatically flows through the MITM proxy.
Input Schema
TableJSON Schema
| Name | Required | Description | Default |
|---|---|---|---|
| url | No | URL to open (default: about:blank) | |
| browser | No | Browser variant to launch | chrome |
| incognito | No | Launch in incognito mode |
Implementation Reference
- src/tools/interceptors.ts:144-180 (handler)The definition and handler implementation for "interceptor_chrome_launch" which uses interceptorManager.activate to start a Chrome instance.
server.tool( "interceptor_chrome_launch", "Launch Chrome/Chromium with proxy flags and SPKI certificate trust. Uses isolated temp profile. Traffic automatically flows through the MITM proxy.", { url: z.string().optional().describe("URL to open (default: about:blank)"), browser: z.enum(["chrome", "chromium", "brave", "edge"]).optional().default("chrome") .describe("Browser variant to launch"), incognito: z.boolean().optional().default(false).describe("Launch in incognito mode"), }, async ({ url, browser, incognito }) => { try { const proxyInfo = requireProxy(); // If fingerprint spoofing is active, enable stealth mode: minimal flags, // stealth script injection, but NO User-Agent override. Chrome keeps its // real UA so in-page bot sensors (Kasada, Akamai) see capabilities that // match the actual browser version. const spoofConfig = proxyManager.getJa3SpoofConfig(); const result = await interceptorManager.activate("chrome", { ...proxyInfo, url, browser, incognito, stealthMode: !!spoofConfig, }); return { content: [{ type: "text", text: JSON.stringify({ status: "success", ...result }), }], }; } catch (e) { return { content: [{ type: "text", text: JSON.stringify({ status: "error", error: errorToString(e) }) }] }; } }, );