Skip to main content
Glama

proxy_check_fingerprint_runtime

Check fingerprint spoofing backend readiness without sending traffic to ensure correct configuration before use.

Instructions

Check fingerprint spoofing backend readiness without sending traffic.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault

No arguments

Implementation Reference

  • The 'proxy_check_fingerprint_runtime' tool is registered on the MCP server using server.tool(), with an empty schema ({}) and an async handler that calls checkSpoofRuntime().
    // ── Check fingerprint spoof runtime readiness ──
    server.tool(
      "proxy_check_fingerprint_runtime",
      "Check fingerprint spoofing backend readiness without sending traffic.",
      {},
      async () => {
        try {
          const runtime = await checkSpoofRuntime();
          return {
            content: [{
              type: "text" as const,
              text: JSON.stringify(runtime),
            }],
          };
        } catch (e) {
          return { content: [{ type: "text" as const, text: JSON.stringify({ status: "error", error: String(e) }) }] };
        }
      },
    );
  • The async handler function for the tool. It calls checkSpoofRuntime(), wraps the result in JSON, and catches any errors returning an error response.
      async () => {
        try {
          const runtime = await checkSpoofRuntime();
          return {
            content: [{
              type: "text" as const,
              text: JSON.stringify(runtime),
            }],
          };
        } catch (e) {
          return { content: [{ type: "text" as const, text: JSON.stringify({ status: "error", error: String(e) }) }] };
        }
      },
    );
  • The checkSpoofRuntime() function that implements the actual logic: instantiates an Impit object to verify the native Rust NAPI module is available and returns readiness status.
    export async function checkSpoofRuntime(): Promise<FingerprintRuntimeCheck> {
      let impitReady = false;
      let impitDetail: string | undefined;
      try {
        new Impit({ browser: "chrome131" as unknown as never });
        impitReady = true;
      } catch (e) {
        impitDetail = (e as Error).message;
      }
      const runtimes: FingerprintRuntimeStatus[] = [
        { name: "impit-node", ready: impitReady, ...(impitDetail ? { detail: impitDetail } : {}) },
      ];
      return {
        status: "success",
        ready: impitReady,
        backend: "impit-node",
        runtimes,
      };
    }
  • The FingerprintRuntimeStatus and FingerprintRuntimeCheck interfaces define the shape of the response returned by checkSpoofRuntime().
    export interface FingerprintRuntimeStatus {
      name: string;
      ready: boolean;
      detail?: string;
    }
    
    export interface FingerprintRuntimeCheck {
      status: "success";
      ready: boolean;
      backend: string;
      /**
       * Per-backend readiness so callers can render multi-backend UIs without
       * re-querying. Today there's a single backend (impit-node); the array
       * keeps the contract forward-compatible if more land later.
       */
      runtimes: FingerprintRuntimeStatus[];
    }
Behavior2/5

Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?

No annotations are provided, so the description must fully convey behavioral traits. It states the tool checks readiness without sending traffic, indicating safety, but it omits details such as whether the check is idempotent, what 'readiness' entails, any required preconditions, or possible side effects. This is insufficient for a mutation-related backend feature.

Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.

Conciseness5/5

Is the description appropriately sized, front-loaded, and free of redundancy?

A single, front-loaded sentence that effectively communicates the tool's core function. No extraneous words; every part earns its place.

Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.

Completeness3/5

Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?

Given the tool has no parameters, no output schema, and no annotations, the description is minimal. It states the action but does not explain what 'readiness' means or how the result is structured. For a simple check tool, this is adequate but could be more helpful by clarifying the outcome.

Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.

Parameters4/5

Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?

The input schema has no parameters (0 params, 100% coverage). Per the baseline rule, a score of 4 is appropriate because the description adds no extra parameter information but does not need to compensate for schema gaps. The description could have explained the concept of 'fingerprint runtime' but is not required to.

Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.

Purpose5/5

Does the description clearly state what the tool does and how it differs from similar tools?

The description clearly specifies the verb 'check', the resource 'fingerprint spoofing backend readiness', and adds the distinguishing detail 'without sending traffic'. This differentiates it from sibling tools like proxy_set_fingerprint_spoof or proxy_list_fingerprint_presets, which have different purposes.

Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.

Usage Guidelines3/5

Does the description explain when to use this tool, when not to, or what alternatives exist?

The phrase 'without sending traffic' implies a non-disruptive read operation, but no explicit guidance is given on when to use this tool versus alternatives like proxy_set_fingerprint_spoof. It doesn't specify prerequisites or expected context, leaving the agent to infer usage.

Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.

Install Server

Other Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/yfe404/proxy-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server