mcp-server

Browser/Puppeteer MCP Server

Web browsing capabilities for AI agents through MCP. Navigate pages, click elements, fill forms, and extract content.

Install
npx -y @modelcontextprotocol/server-puppeteer

Overview

The browser MCP server (also known as Puppeteer MCP) gives AI agents the ability to browse the web programmatically. It supports page navigation, element interaction (click, type, select), screenshot capture, content extraction, and JavaScript execution. This is one of the highest-risk MCP servers because it exposes the agent to arbitrary web content -- every page visited is a potential injection surface.

Features

  • -Navigate to URLs and follow links
  • -Click elements, fill forms, select options
  • -Take screenshots for visual verification
  • -Extract text content and structured data
  • -Execute JavaScript in page context

Security Considerations

The browser MCP server is the most dangerous MCP server from a security perspective. Every web page the agent visits can contain prompt injections that the agent may follow. AgentPwn specifically tests this attack surface. Always use browser sandboxing, restrict allowed domains, and monitor for data exfiltration via URL parameters.

Scan for vulnerabilities: npx hackmyagent secure

Source

Related Tools