返回顶部
🇺🇸 English
🇨🇳 简体中文
🇨🇳 繁體中文
🇺🇸 English
🇯🇵 日本語
🇰🇷 한국어
🇫🇷 Français
🇩🇪 Deutsch
🇪🇸 Español
🇷🇺 Русский
a

anemone-browser

>

作者: admin | 来源: ClawHub
源自
ClawHub
版本
V 1.1.0
安全检测
已通过
364
下载量
免费
免费
0
收藏
概述
安装方式
版本历史

anemone-browser

# Anemone Browser — Managed Browser for OpenClaw Agents Headful Chrome with anti-detection, VNC takeover, and multi-session isolation. Works on Mac, Linux, Docker — anywhere OpenClaw runs. ## Setup ### macOS ```bash bash scripts/setup-mac.sh ``` Detects Chrome, configures OpenClaw browser profile. After setup: ```bash openclaw browser start # Agent's browser tool works automatically ``` > **Note:** macOS setup does NOT include VNC/noVNC. The user is expected to access > the Mac via their own remote desktop solution (e.g. macOS Screen Sharing, Tailscale, > or physical access). VNC takeover with noVNC links is only available on Linux. ### Linux / Docker ```bash # Install deps (once) bash scripts/setup.sh # Start browser + VNC environment bash scripts/start.sh [password] [novnc_port] [cdp_port] [resolution] ``` `start.sh` outputs the noVNC URL, password, and CDP port. Safe to re-run. ## OpenClaw Config Setup scripts configure this automatically. Manual reference: **macOS:** ```json { "browser": { "enabled": true, "defaultProfile": "openclaw", "headless": false, "executablePath": "/Applications/Google Chrome.app/Contents/MacOS/Google Chrome" } } ``` **Linux:** ```json { "browser": { "enabled": true, "headless": false, "noSandbox": true, "executablePath": "/usr/bin/google-chrome-stable" } } ``` ## Multi-Session Window Isolation Multiple sessions share one Chrome (same cookies/logins) but each gets its own window. ### Rules (MUST follow): 1. **On session start — open your own tab, save the targetId:** ``` browser action=open targetUrl="https://example.com" profile=openclaw # Returns targetId — THIS IS YOURS, save it ``` 2. **ALL subsequent calls — always include your targetId:** ``` browser action=snapshot profile=openclaw targetId="<your-targetId>" browser action=navigate profile=openclaw targetId="<your-targetId>" targetUrl="..." browser action=act profile=openclaw targetId="<your-targetId>" ... ``` 3. **On session end — close your tab:** ``` browser action=close targetId="<your-targetId>" ``` 4. **NEVER operate without targetId** — you'll land on another session's tab. 5. **NEVER pick another session's tab** from `browser action=tabs`. ### Opening a new window (not tab) via CDP: ```python import json, asyncio, websockets, urllib.request async def open_new_window(cdp_port, url): version = json.loads(urllib.request.urlopen(f"http://127.0.0.1:{cdp_port}/json/version").read()) async with websockets.connect(version["webSocketDebuggerUrl"]) as ws: await ws.send(json.dumps({ "id": 1, "method": "Target.createTarget", "params": {"url": url, "newWindow": True} })) resp = json.loads(await ws.recv()) return resp["result"]["targetId"] ``` ### Architecture: ``` Chrome (one instance, one profile, shared cookies) ├── Window targetId=AAA → Session A ├── Window targetId=BBB → Session B └── Window targetId=CCC → Session C ``` ## VNC Takeover (CRITICAL) When hitting a CAPTCHA, login wall, or any blocker, **send the user a noVNC link:** ``` https://<IP>:<NOVNC_PORT>/vnc.html?password=<PASSWORD>&autoconnect=true&resize=scale ``` ### Constructing the link: **Linux/Docker** (from start.sh output): ``` https://57.129.90.145:10150/vnc.html?password=e0GGP4xeMUL5ga&autoconnect=true&resize=scale ``` - IP: server's public or Tailscale IP - Port + password: from start.sh output **macOS:** VNC takeover is NOT available. The user must access the Mac directly (physical access, macOS Screen Sharing, or their own remote desktop solution). ### Takeover flow: 1. Agent detects blocker (CAPTCHA, login, 2FA) 2. Agent sends noVNC link to user 3. User opens link → sees Chrome → solves the problem 4. User confirms done → agent continues ## Anti-Detection - **Headful Chrome** — no `HeadlessChrome` in UA - **`--disable-blink-features=AutomationControlled`** — no `navigator.webdriver=true` - **UA override via CDP** if needed: ```json {"method": "Network.setUserAgentOverride", "params": { "userAgent": "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 Chrome/131.0.0.0 Safari/537.36" }} ``` ## Security - SSL/TLS on noVNC (self-signed cert) - Random 14-char password (Linux) or system auth (macOS) - CDP: localhost only, never exposed to network - Chrome Policy: `file://`, `javascript:`, `data:text/html` blocked; extensions blocked; DevTools disabled ## Important: No Kiosk Mode Do NOT use Chrome's `--kiosk` flag. It hides the tab bar and address bar, making multi-window unusable via VNC. Use `--start-maximized` instead.

标签

skill ai

通过对话安装

该技能支持在以下平台通过对话安装:

OpenClaw WorkBuddy QClaw Kimi Claude

方式一:安装 SkillHub 和技能

帮我安装 SkillHub 和 anemone-browser-1776286119 技能

方式二:设置 SkillHub 为优先技能安装源

设置 SkillHub 为我的优先技能安装源,然后帮我安装 anemone-browser-1776286119 技能

通过命令行安装

skillhub install anemone-browser-1776286119

下载

⬇ 下载 anemone-browser v1.1.0(免费)

文件大小: 9.63 KB | 发布时间: 2026-4-16 16:43

v1.1.0 最新 2026-4-16 16:43
Rebrand to Anemone Browser for better discoverability

Archiver·手机版·闲社网·闲社论坛·羊毛社区· 多链控股集团有限公司 · 苏ICP备2025199260号-1

Powered by Discuz! X5.0   © 2024-2025 闲社网·线报更新论坛·羊毛分享社区·http://xianshe.com

p2p_official_large
返回顶部