Loading...
Loading...
Anti-detection browser automation for AI agents. Use when the user needs stealth web browsing, undetectable scraping, fingerprint spoofing, proxy rotation, or privacy-focused browser automation. Triggers include "stealth scrape", "anti-detection", "bypass fingerprinting", "camofox", "camoufox", "undetectable browser", "bot evasion", or any browser task requiring evasion of bot detection systems.
npx skill4agent add redf0x1/camofox-browser camofox-browsercamofox9377plugin.tsuserIdtabId/tabs/open/act/snapshoteNuserIdcamofox open https://example.com --user agent1
camofox snapshot --user agent1
camofox click e5 --user agent1
camofox type e7 "hello world" --user agent1curl -X POST http://localhost:9377/tabs \
-H 'Content-Type: application/json' \
-d '{"userId":"agent1","sessionKey":"default","url":"https://example.com"}'
curl "http://localhost:9377/tabs/<tabId>/snapshot?userId=agent1"
curl -X POST http://localhost:9377/tabs/<tabId>/click \
-H 'Content-Type: application/json' \
-d '{"userId":"agent1","ref":"e5"}'| Intent | CLI | API |
|---|---|---|
| Open tab | | |
| Snapshot refs | | |
| Click element | | |
| Type text | | |
| Navigate | | |
| Screenshot | | |
eNe1e2[e1]="value"camoufox-jslaunchOptionsgenerateFingerprinthumanize: truegeoip: true~/.camofox/profiles/<user>userIdPROXY_HOST/PORT/USERNAME/PASSWORDreferences/anti-detection.mdcamofox open <url> [--user <user>] [--viewport <WxH>] [--geo <preset>]
camofox close [tabId] [--user <user>]
camofox snapshot [tabId] [--user <user>]
camofox click <ref> [tabId] [--user <user>]
camofox type <ref> <text> [tabId] [--user <user>]camofox navigate <url> [tabId] [--user <user>]
camofox screenshot [tabId] [--output <file>] [--full-page] [--user <user>]
camofox fill '[e1]="john" [e2]="john@example.com"' [tabId] [--user <user>]
camofox press Enter [tabId] [--user <user>]camofox get-text [tabId] [--selector <css>] [--user <user>]
camofox get-links [tabId] [--user <user>]
camofox eval '<js expression>' [tabId] [--user <user>]
camofox wait <selector|navigation|networkidle> [tabId] [--timeout <ms>] [--user <user>]camofox search "openclaw plugin" --engine github [tabId] [--user <user>]references/cli-commands.md--user <user>
--port <port>
--format json|text|plainPOST /tabs
GET /tabs
POST /tabs/:tabId/navigate
GET /tabs/:tabId/snapshot
POST /tabs/:tabId/click
POST /tabs/:tabId/type
DELETE /tabs/:tabIdPOST /sessions/:userId/cookies
GET /tabs/:tabId/cookies
GET /tabs/:tabId/screenshot
GET /tabs/:tabId/downloads
GET /users/:userId/downloadsPOST /tabs/:tabId/evaluate
POST /tabs/:tabId/evaluate-extended
POST /tabs/:tabId/extract-resources
POST /tabs/:tabId/batch-download
POST /tabs/:tabId/resolve-blobsGET /
POST /tabs/open
POST /start
POST /stop
POST /navigate
GET /snapshot
POST /actreferences/api-endpoints.mdplugin.ts/youtube/transcriptcamofox snapshot --user agent1
camofox fill '[e4]="Jane Doe" [e5]="jane@example.com"' --user agent1
camofox press Enter --user agent1--usercurl -X POST http://localhost:9377/tabs/<tabId>/type \
-H 'Content-Type: application/json' \
-d '{"userId":"agent1","ref":"e5","text":"jane@example.com"}'camofox open https://target.example --user scraper-us
camofox snapshot --user scraper-us
camofox get-text --selector "main" --user scraper-us
camofox get-links --user scraper-uscamofox search "best playwright anti-detection" --engine duckduckgo --user research1curl -X POST http://localhost:9377/tabs/<tabId>/navigate \
-H 'Content-Type: application/json' \
-d '{"userId":"agent1","macro":"@google_search","query":"camoufox js"}'camofox auth save <profile-name> [--url <url>] [--notes <notes>]
camofox auth load <profile-name>
camofox auth load <profile-name> --inject [tabId] --username-ref <ref> --password-ref <ref> [--user <user>]
camofox auth list [--format <format>]
camofox auth delete <profile-name>
camofox auth change-password <profile-name>07000600references/authentication.mduserIduserIduserIduserIdcamofox open https://example.com --user account-a
camofox snapshot --user account-a
camofox click e9 --user account-acamofox session save checkout-flow --user account-a
camofox session load checkout-flow --user account-atabIduserIdtabIdsearchgoogleyoutubeamazonbingredditduckduckgogithubstackoverflownavigatesrc/utils/macros.ts@google_search@youtube_search@amazon_search@reddit_search@reddit_subreddit@wikipedia_search@twitter_search@yelp_search@spotify_search@netflix_search@linkedin_search@instagram_search@tiktok_search@twitch_searchcamofox search "vite plugin" --engine github --user dev1curl -X POST http://localhost:9377/tabs/<tabId>/navigate \
-H 'Content-Type: application/json' \
-d '{"userId":"dev1","macro":"@google_search","query":"vite plugin github"}'githubstackoverflow@github_search@stackoverflow_searchus-eastus-westjapanukgermanyvietnamsingaporeaustraliacamofox open https://example.com --geo japan --user jp-agentcurl -X POST http://localhost:9377/tabs \
-H 'Content-Type: application/json' \
-d '{"userId":"jp-agent","sessionKey":"default","preset":"japan","url":"https://example.com"}'export CAMOFOX_API_KEY='<api-key>'
export CAMOFOX_ADMIN_KEY='<admin-key>'
export PROXY_HOST='proxy.example.net'
export PROXY_PORT='8080'
export PROXY_USERNAME='proxy-user'
export PROXY_PASSWORD='proxy-pass'CAMOFOX_API_KEY/stopcamofox downloadexport CAMOFOX_PORT=9377
export CAMOFOX_HEADLESS=virtual
export CAMOFOX_MAX_SESSIONS=20
export CAMOFOX_MAX_TABS=10camofox runcamofox runcamofox run script.txt
camofox run script.txt --continue-on-error
cat script.txt | camofox run -#runlogin-and-capture.cf# open login page
open https://example.com/login --user ops1
snapshot --user ops1
fill '[e3]="user@example.com" [e4]="not-stored-here"' --user ops1
press Enter --user ops1
wait networkidle --timeout 12000 --user ops1
screenshot --output login-result.png --user ops1references/cli-commands.mdreferences/api-endpoints.mdreferences/openclaw-tools.mdreferences/anti-detection.mdreferences/authentication.mdreferences/session-management.mduserIdreferences/search-macros.mdreferences/proxy-presets.mdreferences/scripting.mdcamofox runreferences/snapshot-refs.mdeNreferences/media-extraction.mdreferences/display-vnc.mdtemplates/stealth-scraping.shtemplates/search-and-extract.shtemplates/authenticated-session.shtemplates/form-automation.shtemplates/multi-session-pipeline.shtemplates/screenshot-capture.shplugin.ts/youtube/transcriptcore.tsopenclaw.tseNe1e2@eNAGENTS.mdcamofox health --format jsoncamofox get-tabs --user <user> --format jsoncamofox snapshot--useropenclosesnapshotclicktypenavigatescreenshotgo-backgo-forwardget-textget-urlget-linksget-tabsevalwaitsearchfillscrollselecthoverpressdragconsoleerrorstrace starttrace stoptrace chunk-starttrace chunk-stoptrace statussession savesession loadsession listsession deletecookie exportcookie importdownloaddownloadsauth saveauth loadauth listauth deleteauth change-passwordserver startserver stopserver statusannotatehealthversioninforuncore.tsopenclaw.ts//tabs/open/start/stop/navigate/snapshot/act--format jsonplainGETevaluate-extended429408camofox_youtube_transcriptdownloaduserId--userDELETE /sessions/:userId