Camofox-browser: Camoufox에서 제공하는 AI 에이전트용 탐지 방지 브라우저

hackernews | | 📰 뉴스
#ai agent #anti-detection #browser #camoufox #fingerprint
원문 출처: hackernews · Genesis Park에서 요약 및 분석

요약

AI 에이전트의 원활한 웹 브라우징을 지원하기 위해 C++ 수준에서 핑거프린트를 위조하는 'Camoufox' 엔진 기반의 안티 탐지 브라우저 서버가 공개되었습니다. 이 도구는 단순한 플러그인이 아닌 엔진 자체를 패치하여 구글과 클라우드플레어 등의 봇 탐지를 우회하며, 접근성 스냅샷을 활용해 원본 HTML보다 약 90% 적은 데이터를 사용합니다. 대기 시 메모리 사용량을 약 40MB로 최소화하여 라즈베리파이나 저렴한 VPS 환경에서도 가볍게 구동되며, 세션 격리, 프록시 및 지역IP 설정, 자동 로그인을 위한 쿠키 주입 기능 등을 제공합니다. 또한 유튜브 자막 추출과 주요 플랫폼 검색 매크로를 지원하고 Docker를 통해 손쉽게 배포할 수 있어 높은 활용성을 자랑합니다.

본문

Anti-detection browser server for AI agents, powered by Camoufox Standing on the mighty shoulders of Camoufox - a Firefox fork with fingerprint spoofing at the C++ level. The same engine behind Jo — an AI assistant that doesn't need you to babysit it. Runs half on your Mac, half on a dedicated cloud machine that only you use. Available on macOS, Telegram, and WhatsApp. Try the beta free → git clone https://github.com/jo-inc/camofox-browser && cd camofox-browser npm install && npm start # → http://localhost:9377 AI agents need to browse the real web. Playwright gets blocked. Headless Chrome gets fingerprinted. Stealth plugins become the fingerprint. Camoufox patches Firefox at the C++ implementation level - navigator.hardwareConcurrency , WebGL renderers, AudioContext, screen geometry, WebRTC - all spoofed before JavaScript ever sees them. No shims, no wrappers, no tells. This project wraps that engine in a REST API built for agents: accessibility snapshots instead of bloated HTML, stable element refs for clicking, and search macros for common sites. - C++ Anti-Detection - bypasses Google, Cloudflare, and most bot detection - Element Refs - stable e1 ,e2 ,e3 identifiers for reliable interaction - Token-Efficient - accessibility snapshots are ~90% smaller than raw HTML - Runs on Anything - lazy browser launch + idle shutdown keeps memory at ~40MB when idle. Designed to share a box with the rest of your stack — Raspberry Pi, $5 VPS, shared Railway infra. - Session Isolation - separate cookies/storage per user - Cookie Import - inject Netscape-format cookie files for authenticated browsing - Proxy + GeoIP - route traffic through residential proxies with automatic locale/timezone - Structured Logging - JSON log lines with request IDs for production observability - YouTube Transcripts - extract captions from any YouTube video via yt-dlp, no API key needed - Search Macros - @google_search ,@youtube_search ,@amazon_search ,@reddit_subreddit , and 10 more - Snapshot Screenshots - include a base64 PNG screenshot alongside the accessibility snapshot - Large Page Handling - automatic snapshot truncation with offset-based pagination - Download Capture - capture browser downloads and fetch them via API (optional inline base64) - DOM Image Extraction - list src/alt and optionally return inline data URLs - Deploy Anywhere - Docker, Fly.io, Railway | Dependency | Purpose | Install | |---|---|---| | yt-dlp | YouTube transcript extraction (fast path) | pip install yt-dlp or brew install yt-dlp | The Docker image includes yt-dlp. For local dev, install it for the /youtube/transcript endpoint. Without it, the endpoint falls back to a slower browser-based method. openclaw plugins install @askjo/camofox-browser Tools: camofox_create_tab · camofox_snapshot · camofox_click · camofox_type · camofox_navigate · camofox_scroll · camofox_screenshot · camofox_close_tab · camofox_list_tabs · camofox_import_cookies git clone https://github.com/jo-inc/camofox-browser cd camofox-browser npm install npm start # downloads Camoufox on first run (~300MB) Default port is 9377 . See Environment Variables for all options. The included Makefile auto-detects your CPU architecture and pre-downloads Camoufox + yt-dlp binaries outside the Docker build, so rebuilds are fast (~30s vs ~3min). # Build and start (auto-detects arch: aarch64 on M1/M2, x86_64 on Intel) make up # Stop and remove the container make down # Force a clean rebuild (e.g. after upgrading VERSION/RELEASE) make reset # Just download binaries (without building) make fetch # Override arch or version explicitly make up ARCH=x86_64 make up VERSION=135.0.1 RELEASE=beta.24 Note: make fetch (or make build ) must be run first — the Dockerfile expects pre-downloaded binaries in dist/ . fly.toml and railway.toml are included. Deploy with fly deploy or connect the repo to Railway. Import cookies from your browser into Camoufox to skip interactive login on sites like LinkedIn, Amazon, etc. 1. Generate a secret key: # macOS / Linux openssl rand -hex 32 2. Set the environment variable before starting OpenClaw: export CAMOFOX_API_KEY="your-generated-key" openclaw start The same key is used by both the plugin (to authenticate requests) and the server (to verify them). Both run from the same environment — set it once. Why an env var? The key is a secret. Plugin config in openclaw.json is stored in plaintext, so secrets don't belong there. SetCAMOFOX_API_KEY in your shell profile, systemd unit, Docker env, or Fly.io secrets. Cookie import is disabled by default. If CAMOFOX_API_KEY is not set, the server rejects all cookie requests with 403. 3. Export cookies from your browser: Install a browser extension that exports Netscape-format cookie files (e.g., "cookies.txt" for Chrome/Firefox). Export the cookies for the site you want to authenticate. 4. Place the cookie file: mkdir -p ~/.camofox/cookies cp ~/Downloads/linkedin_cookies.txt ~/.camofox/cookies/linkedin.txt The default directory is ~/.camofox/cookie

Genesis Park 편집팀이 AI를 활용하여 작성한 분석입니다. 원문은 출처 링크를 통해 확인할 수 있습니다.

공유

관련 저널 읽기

전체 보기 →