_______               __                   _______
       |   |   |.---.-..----.|  |--..-----..----. |    |  |.-----..--.--.--..-----.
       |       ||  _  ||  __||    < |  -__||   _| |       ||  -__||  |  |  ||__ --|
       |___|___||___._||____||__|__||_____||__|   |__|____||_____||________||_____|
                                                             on Gopher (inofficial)
   URI Visit Hacker News on the Web
       
       
       COMMENT PAGE FOR:
   URI   Let your Coding Agent debug the browser session with Chrome DevTools MCP
       
       
        pritesh1908 wrote 2 min ago:
        I have been using Playwright for a fairly long time now. Do checkout
       
        JKolios wrote 2 min ago:
        Now that there's widespread direct connectivity between agents and
        browser sessions, are CAPTCHAs even relevant anymore?
       
        tonyhschu wrote 6 min ago:
        Very cool. I do something like this but with Playwright. It used to be
        a real token hog though, and got expensive fast. So much so that I
        built a wrapper to dump results to disk first then let the agent query
        instead. [1] Will check this out to see if they’ve solved the token
        burn problem.
        
   URI  [1]: https://uisnap.dev/
       
        oldeucryptoboi wrote 7 min ago:
        I tell Claude to use playwright so I don't even need to do the setup
        myself.
       
          nomilk wrote 5 min ago:
          Similarly, cursor has a built in browser and visit localhost to see
          the results in the browser. Although I don't use it much (I probably
          should).
       
        slrainka wrote 11 min ago:
        chrome-cli with remote developer port has been working fine this entire
        time.
       
        raw_anon_1111 wrote 16 min ago:
        I don’t do any serious web development and haven’t for 25 years
        aside from recently vibe coding internal web admin portals for back end
        cloud + app dev projects.  But I did recently have to implement a web
        crawler for a customer’s site for a RAG project using Chromium +
        Playwrite in a Docker container deployed to Lambda.
        
        I ran the Docker container locally for testing.  Could a web developer
        test using Claude + Chromium in a Docker container without using their
        real Chrome instance?
       
        boomskats wrote 34 min ago:
        Been using this one for a while, mostly with codex on opencode. It's
        more reliable and token efficient than other devtools protocol MCPs
        i've tried.
        
        Favourite unexpected use case for me was telling gemini to use it as a
        SVG editing repl, where it was able to produce some fantastic looking
        custom icons for me after 3-4 generate/refresh/screenshot iterations.
        
        Also works very nicely with electron apps, both reverse engineering and
        extending.
       
        zxspectrumk48 wrote 47 min ago:
        I found this one working amazingly well (same idea - connect to
        existing session):
        
   URI  [1]: https://github.com/remorses/playwriter
       
        speedgoose wrote 1 hour 6 min ago:
        Interesting. MCP APIs can be useful for humans too.
        
        Chrome's dev tools already had an API [1], but perhaps the new MCP one
        is more user friendly, as one main requirement of MCP APIs is to be
        understood and used correctly by current gen AI agents.
        
        [1] 
        
   URI  [1]: https://chromedevtools.github.io/devtools-protocol/
       
        NiekvdMaas wrote 1 hour 6 min ago:
        Also works nicely together with agent-browser ( [1] ) using
        --auto-connect
        
   URI  [1]: https://github.com/vercel-labs/agent-browser
       
        Yokohiii wrote 1 hour 11 min ago:
        Was already eye rolling about the headline. Then I realized it's from
        chrome.
        
        Hoping from some good stories from open claw users that permanently run
        debug sessions.
       
        aadishv wrote 1 hour 20 min ago:
        Someone already made a great agent skill for this, which I'm using
        daily, and it's been very cool! [1] For example, I use codex to manage
        a local music library, and it was able to use the skill to open a YT
        Music tab in my browser, search for each album, and get the URL to pass
        to yt-dlp.
        
        Do note that it only works for Chrome browsers rn, so you have to edit
        the script to point to a different Chromium browser's binary (e.g. I
        use Helium) but it's simple enough
        
   URI  [1]: https://github.com/pasky/chrome-cdp-skill
       
          Etheryte wrote 1 hour 16 min ago:
          On one hand, cool demo, on the other, this is horrifying in more ways
          than I can begin to describe. You're literally one prompt injection
          away from someone having unlimited access to all of your everything.
       
            sheepscreek wrote 38 min ago:
            As long as it’s gated and not turned on by default, it’s all
            good. They could also add a warning/sanity check similar to
            “allow pasting” in the console.
       
            mh- wrote 1 hour 7 min ago:
            Not the person you're replying to, but: I just use a separate,
            dedicated Chrome profile that isn't logged into anything except
            what I'm working on. Then I keep the persistence, but without
            commingling in a way that dramatically increases the risk.
            
            edit: upon rereading, I now realize the (different) prompt
            injection risk you were calling out re: the handoff to yt-dlp.
            Separate profiles won't save you from that, though there are other
            approaches.
       
              sofixa wrote 3 min ago:
              Even without the bash escape risk (which can be mitigated with
              the various ways of only allowing yt-dlp to be executed), YT
              Music is a paid service gated behind a Google account, with
              associated payment method. Even just stealing the auth cookie is
              pretty serious in terms of damage it could do.
       
            aadishv wrote 1 hour 15 min ago:
            Of course I still watch it and have my finger on the escape key at
            all times :)
       
              glenpierce wrote 15 min ago:
              I am in awe of the confidence you have in your reflexes.
       
              bergheim wrote 50 min ago:
              For now you are. All these things fall with time, of course. You
              will stop caring once you start feeling safe, we all do.
              
              Also. AAarrgh, my new thing to be annoyed at is AI drivel written
              slop.
              
              "No browser automation framework, no separate browser instance,
              no re-login."
              
              Oh really, nice. No separate computer either? No separate power
              station, no house, no star wars? No something else we didn't ask
              for? Just one a toggle and you go? Whoaaaaaa.
              
              Edit: lol even the skill itself is vibe coded:
              
              Lightweight Chrome DevTools Protocol CLI. Connects directly via
              WebSocket — no Puppeteer, works with 100+ tabs, instant
              connection.
              
              I feel like there's nothing fucking left on the internet anymore
              that is not some mean of whatever the LLM is trained to talk like
              now.
       
                tacitusarc wrote 22 min ago:
                What can you do? I mentioned the use of AI on another thread,
                asking essentially the same question. The comment was flagged,
                presumably as off topic. Fair enough, I guess. But about 80%
                (maybe more) of posted blogs etc that I see on HN now have very
                obvious signs of AI. Comments do too. I hate it. If I want to
                see what Claude thinks I can ask it.
                
                HN is becoming close to unusable, and this isn’t like the
                previous times where people say it’s like reddit or
                something. It is inundated with bot spam, it just happens the
                bot spam is sufficiently engaging and well-written that it is
                really hard to address.
       
       
   DIR <- back to front page