Skip to content
Home » Cloud Browser MCP Server

Cloud Browser MCP Server

DICloak Browser MCP is a powerful browser automation and multi-account management tool built on top of the DICloak Anti-Detect Browser. It exposes a rich set of browser interaction capabilities via the Model Context Protocol (MCP), enabling programmatic control over tabs, navigation, content extraction, network inspection, and more—all while maintaining session isolation and digital identity safety.

This MCP server is ideal for developers building AI agents, automation workflows, or scraping tools that require robust, fingerprint-safe browser environments.

✨ Features

  • Full browser control: Open tabs, navigate, click, fill forms, capture screenshots, and simulate keyboard input.
  • Content extraction: Retrieve HTML, text, element attributes, or semantic embeddings from pages.
  • Network monitoring: Capture and analyze network requests with full browser context.
  • Interactive element discovery: Find buttons, links, or inputs by selector or fuzzy text match.
  • Browser history & console access: Inspect browsing history and JavaScript console output.
  • Script injection & communication: Inject custom JS and send messages to injected scripts.
  • Semantic search: Index and search page content using vector embeddings.
  • Multi-profile & anti-detect support: Leverages DICloak’s core isolation and fingerprint spoofing technology.

💡 All operations are performed within isolated, anti-detection browser profiles—essential for managing multiple accounts safely on platforms like social media, e-commerce, and affiliate networks.

🔌 Integration

To use this MCP server in your application (e.g., with an AI agent framework), add the following configuration to your MCP client:

{
  "mcpServers": {
    "dicloak-mcp-http": {
      "type": "streamableHttp",
      "url": "https://mcp.dicloak.com/stream?apikey=XXXXXXXXXXXXXXXXX",
      "description": "DICloak Chrome Browser MCP Service"
    }
  }
}

🔑 Replace XXXXXXXXXXXXXXXXX with your actual API key from DICloak.

🛠️ Available Tools

The MCP server provides the following tools (simplified list; full schema available in code):

Tool NameDescription
get_windows_and_tabsList all open windows and tabs
chrome_navigateNavigate to a URL or refresh
chrome_screenshotCapture full-page or element screenshots (PNG or Base64)
chrome_close_tabsClose tabs by ID, URL, or all
chrome_go_back_or_forwardNavigate browser history
chrome_get_web_contentExtract HTML or text content (with selector support)
chrome_get_element_attributesGet element properties, styles, and bounding box
chrome_click_elementClick by selector or coordinates
chrome_fill_or_selectFill input fields or select dropdown options
chrome_get_interactive_elementsDiscover clickable/interactive elements
chrome_network_requestSend authenticated HTTP requests from browser context
chrome_network_capture_start/stopCapture outgoing network traffic
chrome_keyboardSimulate key presses (e.g., PageDown, Ctrl+C)
chrome_historySearch browsing history
search_tabs_contentSearch open tabs by content
chrome_vector_searchSemantic search via embeddings (index, search, etc.)
chrome_consoleRetrieve console logs and errors
chrome_inject_scriptInject or manage JavaScript in the page
chrome_send_command_to_inject_scriptCommunicate with injected scripts via custom events
chrome_content_analysisSummarize, analyze, or extract entities from text

📝 All tools support optional parameters for fine-grained control. See source code or schema definitions for full specifications.