cbrowser 7.4.1 → 7.4.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (107) hide show
  1. package/README.md +159 -46
  2. package/dist/analysis/bug-hunter.d.ts +0 -0
  3. package/dist/analysis/bug-hunter.d.ts.map +0 -0
  4. package/dist/analysis/bug-hunter.js +0 -0
  5. package/dist/analysis/bug-hunter.js.map +0 -0
  6. package/dist/analysis/chaos-testing.d.ts +0 -0
  7. package/dist/analysis/chaos-testing.d.ts.map +0 -0
  8. package/dist/analysis/chaos-testing.js +0 -0
  9. package/dist/analysis/chaos-testing.js.map +0 -0
  10. package/dist/analysis/index.d.ts +0 -0
  11. package/dist/analysis/index.d.ts.map +0 -0
  12. package/dist/analysis/index.js +0 -0
  13. package/dist/analysis/index.js.map +0 -0
  14. package/dist/analysis/natural-language.d.ts +0 -0
  15. package/dist/analysis/natural-language.d.ts.map +0 -0
  16. package/dist/analysis/natural-language.js +0 -0
  17. package/dist/analysis/natural-language.js.map +0 -0
  18. package/dist/analysis/persona-comparison.d.ts +0 -0
  19. package/dist/analysis/persona-comparison.d.ts.map +0 -0
  20. package/dist/analysis/persona-comparison.js +0 -0
  21. package/dist/analysis/persona-comparison.js.map +0 -0
  22. package/dist/browser.d.ts +0 -0
  23. package/dist/browser.d.ts.map +0 -0
  24. package/dist/browser.js +0 -0
  25. package/dist/browser.js.map +0 -0
  26. package/dist/cli.d.ts +0 -0
  27. package/dist/cli.d.ts.map +0 -0
  28. package/dist/cli.js +17 -1
  29. package/dist/cli.js.map +1 -1
  30. package/dist/config.d.ts +0 -0
  31. package/dist/config.d.ts.map +0 -0
  32. package/dist/config.js +0 -0
  33. package/dist/config.js.map +0 -0
  34. package/dist/daemon.d.ts +0 -0
  35. package/dist/daemon.d.ts.map +0 -0
  36. package/dist/daemon.js +0 -0
  37. package/dist/daemon.js.map +0 -0
  38. package/dist/index.d.ts +0 -0
  39. package/dist/index.d.ts.map +0 -0
  40. package/dist/index.js +0 -0
  41. package/dist/index.js.map +0 -0
  42. package/dist/mcp-server-remote.d.ts +23 -0
  43. package/dist/mcp-server-remote.d.ts.map +1 -0
  44. package/dist/mcp-server-remote.js +890 -0
  45. package/dist/mcp-server-remote.js.map +1 -0
  46. package/dist/mcp-server.d.ts +0 -0
  47. package/dist/mcp-server.d.ts.map +0 -0
  48. package/dist/mcp-server.js +1 -1
  49. package/dist/mcp-server.js.map +0 -0
  50. package/dist/performance/index.d.ts +0 -0
  51. package/dist/performance/index.d.ts.map +0 -0
  52. package/dist/performance/index.js +0 -0
  53. package/dist/performance/index.js.map +0 -0
  54. package/dist/performance/metrics.d.ts +0 -0
  55. package/dist/performance/metrics.d.ts.map +0 -0
  56. package/dist/performance/metrics.js +0 -0
  57. package/dist/performance/metrics.js.map +0 -0
  58. package/dist/personas.d.ts +0 -0
  59. package/dist/personas.d.ts.map +0 -0
  60. package/dist/personas.js +0 -0
  61. package/dist/personas.js.map +0 -0
  62. package/dist/testing/coverage.d.ts +0 -0
  63. package/dist/testing/coverage.d.ts.map +0 -0
  64. package/dist/testing/coverage.js +0 -0
  65. package/dist/testing/coverage.js.map +0 -0
  66. package/dist/testing/flaky-detection.d.ts +0 -0
  67. package/dist/testing/flaky-detection.d.ts.map +0 -0
  68. package/dist/testing/flaky-detection.js +0 -0
  69. package/dist/testing/flaky-detection.js.map +0 -0
  70. package/dist/testing/index.d.ts +0 -0
  71. package/dist/testing/index.d.ts.map +0 -0
  72. package/dist/testing/index.js +0 -0
  73. package/dist/testing/index.js.map +0 -0
  74. package/dist/testing/nl-test-suite.d.ts +0 -0
  75. package/dist/testing/nl-test-suite.d.ts.map +0 -0
  76. package/dist/testing/nl-test-suite.js +0 -0
  77. package/dist/testing/nl-test-suite.js.map +0 -0
  78. package/dist/testing/test-repair.d.ts +0 -0
  79. package/dist/testing/test-repair.d.ts.map +0 -0
  80. package/dist/testing/test-repair.js +0 -0
  81. package/dist/testing/test-repair.js.map +0 -0
  82. package/dist/types.d.ts +0 -0
  83. package/dist/types.d.ts.map +0 -0
  84. package/dist/types.js +0 -0
  85. package/dist/types.js.map +0 -0
  86. package/dist/visual/ab-comparison.d.ts +0 -0
  87. package/dist/visual/ab-comparison.d.ts.map +1 -1
  88. package/dist/visual/ab-comparison.js +3 -2
  89. package/dist/visual/ab-comparison.js.map +1 -1
  90. package/dist/visual/cross-browser.d.ts +0 -0
  91. package/dist/visual/cross-browser.d.ts.map +1 -1
  92. package/dist/visual/cross-browser.js +2 -1
  93. package/dist/visual/cross-browser.js.map +1 -1
  94. package/dist/visual/index.d.ts +0 -0
  95. package/dist/visual/index.d.ts.map +0 -0
  96. package/dist/visual/index.js +0 -0
  97. package/dist/visual/index.js.map +0 -0
  98. package/dist/visual/regression.d.ts +0 -0
  99. package/dist/visual/regression.d.ts.map +1 -1
  100. package/dist/visual/regression.js +2 -1
  101. package/dist/visual/regression.js.map +1 -1
  102. package/dist/visual/responsive.d.ts +0 -0
  103. package/dist/visual/responsive.d.ts.map +1 -1
  104. package/dist/visual/responsive.js +3 -2
  105. package/dist/visual/responsive.js.map +1 -1
  106. package/docs/REMOTE-MCP-SERVER.md +520 -0
  107. package/package.json +6 -1
@@ -0,0 +1,520 @@
1
+ # Remote MCP Server Deployment Guide
2
+
3
+ Deploy CBrowser (Cognitive Browser) as a remote MCP server for claude.ai custom connectors. This allows your entire team to use CBrowser through Claude without local installation.
4
+
5
+ ## Architecture Overview
6
+
7
+ ```
8
+ ┌─────────────────┐ HTTPS ┌─────────────────┐ HTTP ┌─────────────────┐
9
+ │ claude.ai │ ──────────────>│ Nginx/Caddy │ ────────────> │ CBrowser MCP │
10
+ │ (Custom MCP) │ :443 │ Reverse Proxy │ :3100 │ Server │
11
+ └─────────────────┘ └─────────────────┘ └─────────────────┘
12
+
13
+ ┌──────┴──────┐
14
+ │ Cloudflare │ (optional)
15
+ │ or SSL │
16
+ └─────────────┘
17
+ ```
18
+
19
+ ## Prerequisites
20
+
21
+ ### System Requirements
22
+
23
+ | Requirement | Minimum | Recommended |
24
+ |-------------|---------|-------------|
25
+ | **OS** | Ubuntu 20.04+ / Debian 11+ | Ubuntu 22.04 LTS |
26
+ | **RAM** | 2 GB | 4 GB |
27
+ | **CPU** | 2 cores | 4 cores |
28
+ | **Storage** | 10 GB | 20 GB |
29
+ | **Node.js** | 18.x | 20.x LTS |
30
+
31
+ ### Required Software
32
+
33
+ ```bash
34
+ # Update system
35
+ sudo apt update && sudo apt upgrade -y
36
+
37
+ # Install Node.js 20.x
38
+ curl -fsSL https://deb.nodesource.com/setup_20.x | sudo -E bash -
39
+ sudo apt install -y nodejs
40
+
41
+ # Install nginx
42
+ sudo apt install -y nginx
43
+
44
+ # Verify installations
45
+ node --version # Should be v20.x
46
+ nginx -v # Should show nginx version
47
+ ```
48
+
49
+ ### Domain & DNS
50
+
51
+ You'll need:
52
+ - A domain name (e.g., `cbrowser-mcp.yourdomain.com`)
53
+ - DNS A record pointing to your server's IP
54
+ - SSL certificate (Let's Encrypt or Cloudflare Origin)
55
+
56
+ ---
57
+
58
+ ## Step 1: Install CBrowser
59
+
60
+ ```bash
61
+ # Create application directory
62
+ sudo mkdir -p /opt/cbrowser
63
+ cd /opt/cbrowser
64
+
65
+ # Install CBrowser globally or locally
66
+ npm init -y
67
+ npm install cbrowser
68
+
69
+ # Install Playwright browsers
70
+ npx playwright install chromium firefox webkit
71
+ npx playwright install-deps # Install system dependencies
72
+
73
+ # Create data directory
74
+ sudo mkdir -p /home/$USER/.cbrowser/{sessions,screenshots,videos,har,personas,scenarios,helpers,audit,baselines,browser-state,cache,journeys,performance,visual,tests,repairs,config,visual-baselines,cross-browser,responsive,ab-comparison}
75
+ sudo chown -R $USER:$USER /home/$USER/.cbrowser
76
+ ```
77
+
78
+ ---
79
+
80
+ ## Step 2: Create Systemd Service
81
+
82
+ Create the service file:
83
+
84
+ ```bash
85
+ sudo nano /etc/systemd/system/cbrowser-mcp.service
86
+ ```
87
+
88
+ Paste this configuration:
89
+
90
+ ```ini
91
+ [Unit]
92
+ Description=CBrowser Remote MCP Server
93
+ After=network.target
94
+
95
+ [Service]
96
+ Type=simple
97
+ User=YOUR_USERNAME
98
+ Group=YOUR_GROUP
99
+ WorkingDirectory=/opt/cbrowser
100
+
101
+ # Create data directories on startup
102
+ ExecStartPre=/bin/bash -c 'mkdir -p /home/YOUR_USERNAME/.cbrowser/{sessions,screenshots,videos,har,personas,scenarios,helpers,audit,baselines,browser-state,cache,journeys,performance,visual,tests,repairs,config,visual-baselines,cross-browser,responsive,ab-comparison}'
103
+
104
+ # Start the MCP server
105
+ ExecStart=/usr/bin/node node_modules/cbrowser/dist/mcp-server-remote.js
106
+
107
+ Restart=on-failure
108
+ RestartSec=5
109
+
110
+ # Environment
111
+ Environment=NODE_ENV=production
112
+ Environment=PORT=3100
113
+ Environment=HOST=127.0.0.1
114
+ Environment=MCP_SESSION_MODE=stateless
115
+ Environment=CBROWSER_DATA_DIR=/home/YOUR_USERNAME/.cbrowser
116
+
117
+ # Authentication (optional - remove to allow open access)
118
+ # Generate a secure key: openssl rand -hex 32
119
+ Environment=MCP_API_KEY=your-secure-api-key-here
120
+ # Or use multiple keys: Environment=MCP_API_KEYS=key1,key2,key3
121
+
122
+ # Security hardening (optional but recommended)
123
+ NoNewPrivileges=yes
124
+ ProtectSystem=strict
125
+ ProtectHome=read-only
126
+ PrivateTmp=yes
127
+ ReadWritePaths=/opt/cbrowser /home/YOUR_USERNAME/.cbrowser /home/YOUR_USERNAME/.cache/ms-playwright
128
+
129
+ [Install]
130
+ WantedBy=multi-user.target
131
+ ```
132
+
133
+ **Important:** Replace `YOUR_USERNAME` and `YOUR_GROUP` with your actual user/group.
134
+
135
+ Enable and start the service:
136
+
137
+ ```bash
138
+ # Reload systemd
139
+ sudo systemctl daemon-reload
140
+
141
+ # Enable on boot
142
+ sudo systemctl enable cbrowser-mcp
143
+
144
+ # Start the service
145
+ sudo systemctl start cbrowser-mcp
146
+
147
+ # Check status
148
+ sudo systemctl status cbrowser-mcp
149
+ ```
150
+
151
+ Verify it's running:
152
+
153
+ ```bash
154
+ curl http://localhost:3100/health
155
+ # Should return: {"status":"ok","version":"7.x.x"}
156
+ ```
157
+
158
+ ---
159
+
160
+ ## Step 3: Configure Nginx Reverse Proxy
161
+
162
+ Create nginx configuration:
163
+
164
+ ```bash
165
+ sudo nano /etc/nginx/sites-available/cbrowser-mcp.conf
166
+ ```
167
+
168
+ ### Option A: With Cloudflare (Recommended)
169
+
170
+ ```nginx
171
+ # HTTP redirect to HTTPS
172
+ server {
173
+ listen 80;
174
+ listen [::]:80;
175
+ server_name cbrowser-mcp.yourdomain.com;
176
+ return 301 https://$server_name$request_uri;
177
+ }
178
+
179
+ # HTTPS with Cloudflare Origin Certificate
180
+ server {
181
+ listen 443 ssl http2;
182
+ listen [::]:443 ssl http2;
183
+ server_name cbrowser-mcp.yourdomain.com;
184
+
185
+ # Cloudflare Origin Certificate
186
+ ssl_certificate /etc/ssl/certs/yourdomain-origin.pem;
187
+ ssl_certificate_key /etc/ssl/private/yourdomain-origin.key;
188
+
189
+ # SSL security settings
190
+ ssl_protocols TLSv1.2 TLSv1.3;
191
+ ssl_prefer_server_ciphers on;
192
+ ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256;
193
+
194
+ # Reverse proxy to MCP server
195
+ location / {
196
+ proxy_pass http://127.0.0.1:3100;
197
+ proxy_http_version 1.1;
198
+
199
+ # WebSocket/SSE support for MCP
200
+ proxy_set_header Upgrade $http_upgrade;
201
+ proxy_set_header Connection "upgrade";
202
+
203
+ # Standard proxy headers
204
+ proxy_set_header Host $host;
205
+ proxy_set_header X-Real-IP $remote_addr;
206
+ proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
207
+ proxy_set_header X-Forwarded-Proto $scheme;
208
+
209
+ # Extended timeouts for long-running MCP operations
210
+ proxy_connect_timeout 300s;
211
+ proxy_send_timeout 300s;
212
+ proxy_read_timeout 300s;
213
+
214
+ # Disable buffering for SSE
215
+ proxy_buffering off;
216
+ proxy_cache off;
217
+
218
+ # MCP session header passthrough
219
+ proxy_pass_header Mcp-Session-Id;
220
+ }
221
+
222
+ # Logging
223
+ access_log /var/log/nginx/cbrowser-mcp.access.log;
224
+ error_log /var/log/nginx/cbrowser-mcp.error.log;
225
+ }
226
+ ```
227
+
228
+ ### Option B: With Let's Encrypt
229
+
230
+ ```bash
231
+ # Install Certbot
232
+ sudo apt install certbot python3-certbot-nginx
233
+
234
+ # Get certificate
235
+ sudo certbot --nginx -d cbrowser-mcp.yourdomain.com
236
+ ```
237
+
238
+ Enable the site:
239
+
240
+ ```bash
241
+ # Enable site
242
+ sudo ln -s /etc/nginx/sites-available/cbrowser-mcp.conf /etc/nginx/sites-enabled/
243
+
244
+ # Test configuration
245
+ sudo nginx -t
246
+
247
+ # Reload nginx
248
+ sudo systemctl reload nginx
249
+ ```
250
+
251
+ ---
252
+
253
+ ## Step 4: Cloudflare Configuration (Optional)
254
+
255
+ If using Cloudflare:
256
+
257
+ ### DNS Settings
258
+
259
+ 1. Add an **A record**:
260
+ - Name: `cbrowser-mcp`
261
+ - IPv4 address: Your server IP
262
+ - Proxy status: **Proxied** (orange cloud)
263
+
264
+ ### SSL/TLS Settings
265
+
266
+ 1. Go to **SSL/TLS → Overview**
267
+ 2. Set encryption mode to **Full (strict)**
268
+
269
+ ### Origin Certificates
270
+
271
+ 1. Go to **SSL/TLS → Origin Server**
272
+ 2. Click **Create Certificate**
273
+ 3. Generate with:
274
+ - Key type: RSA (2048)
275
+ - Hostnames: `cbrowser-mcp.yourdomain.com`
276
+ - Validity: 15 years
277
+ 4. Download and save:
278
+ - Certificate → `/etc/ssl/certs/yourdomain-origin.pem`
279
+ - Private key → `/etc/ssl/private/yourdomain-origin.key`
280
+
281
+ ### Page Rules (Recommended)
282
+
283
+ Create a page rule to bypass caching:
284
+
285
+ 1. Go to **Rules → Page Rules**
286
+ 2. Create rule:
287
+ - URL: `cbrowser-mcp.yourdomain.com/*`
288
+ - Setting: **Cache Level → Bypass**
289
+
290
+ ---
291
+
292
+ ## Step 5: Test the Deployment
293
+
294
+ ### Health Check
295
+
296
+ ```bash
297
+ curl https://cbrowser-mcp.yourdomain.com/health
298
+ # {"status":"ok","version":"7.4.2"}
299
+ ```
300
+
301
+ ### Info Endpoint
302
+
303
+ ```bash
304
+ curl https://cbrowser-mcp.yourdomain.com/info
305
+ ```
306
+
307
+ ### MCP Initialize (for debugging)
308
+
309
+ ```bash
310
+ curl -X POST https://cbrowser-mcp.yourdomain.com/mcp \
311
+ -H "Content-Type: application/json" \
312
+ -H "Accept: application/json, text/event-stream" \
313
+ -d '{"jsonrpc":"2.0","method":"initialize","id":1,"params":{"protocolVersion":"2024-11-05","capabilities":{},"clientInfo":{"name":"test","version":"1.0.0"}}}'
314
+ ```
315
+
316
+ ---
317
+
318
+ ## Step 6: Connect to Claude.ai
319
+
320
+ 1. Go to [claude.ai](https://claude.ai)
321
+ 2. Open **Settings → Integrations → Custom MCP Servers**
322
+ 3. Add new connector:
323
+ - **Name:** CBrowser
324
+ - **URL:** `https://cbrowser-mcp.yourdomain.com/mcp`
325
+ 4. Click **Connect**
326
+
327
+ You should see 31 CBrowser tools become available in Claude.
328
+
329
+ ---
330
+
331
+ ## Security Considerations
332
+
333
+ ### Firewall Rules
334
+
335
+ ```bash
336
+ # Allow only necessary ports
337
+ sudo ufw allow 22/tcp # SSH
338
+ sudo ufw allow 80/tcp # HTTP (redirect)
339
+ sudo ufw allow 443/tcp # HTTPS
340
+ sudo ufw enable
341
+ ```
342
+
343
+ ### Authentication (v7.4.3+)
344
+
345
+ CBrowser Remote MCP Server supports API key authentication:
346
+
347
+ **Enable authentication:**
348
+
349
+ ```bash
350
+ # Single API key
351
+ Environment=MCP_API_KEY=your-secure-key
352
+
353
+ # Multiple API keys (for different users/services)
354
+ Environment=MCP_API_KEYS=user1-key,user2-key,service-key
355
+ ```
356
+
357
+ **Generate a secure key:**
358
+
359
+ ```bash
360
+ openssl rand -hex 32
361
+ ```
362
+
363
+ **Client usage:**
364
+
365
+ ```bash
366
+ # Bearer token (recommended)
367
+ curl -H "Authorization: Bearer your-api-key" https://your-server/mcp
368
+
369
+ # X-API-Key header (alternative)
370
+ curl -H "X-API-Key: your-api-key" https://your-server/mcp
371
+ ```
372
+
373
+ **Endpoints:**
374
+ - `/health` and `/info` are always open (no auth required)
375
+ - `/mcp` requires authentication when `MCP_API_KEY` or `MCP_API_KEYS` is set
376
+
377
+ **Additional security layers:**
378
+ 1. Use Cloudflare Access for additional authentication
379
+ 2. Restrict to IP whitelist in nginx
380
+ 3. Enable rate limiting (see below)
381
+
382
+ ### Rate Limiting
383
+
384
+ Add to nginx config:
385
+
386
+ ```nginx
387
+ # In http block of /etc/nginx/nginx.conf
388
+ limit_req_zone $binary_remote_addr zone=mcp:10m rate=10r/s;
389
+
390
+ # In server block
391
+ location / {
392
+ limit_req zone=mcp burst=20 nodelay;
393
+ # ... rest of config
394
+ }
395
+ ```
396
+
397
+ ---
398
+
399
+ ## Monitoring
400
+
401
+ ### View Logs
402
+
403
+ ```bash
404
+ # Service logs
405
+ sudo journalctl -u cbrowser-mcp -f
406
+
407
+ # Nginx access logs
408
+ sudo tail -f /var/log/nginx/cbrowser-mcp.access.log
409
+
410
+ # Nginx error logs
411
+ sudo tail -f /var/log/nginx/cbrowser-mcp.error.log
412
+ ```
413
+
414
+ ### Health Check Script
415
+
416
+ Create `/opt/cbrowser/healthcheck.sh`:
417
+
418
+ ```bash
419
+ #!/bin/bash
420
+ response=$(curl -s -o /dev/null -w "%{http_code}" http://localhost:3100/health)
421
+ if [ "$response" != "200" ]; then
422
+ echo "CBrowser MCP unhealthy, restarting..."
423
+ sudo systemctl restart cbrowser-mcp
424
+ fi
425
+ ```
426
+
427
+ Add to cron:
428
+
429
+ ```bash
430
+ # Run every 5 minutes
431
+ */5 * * * * /opt/cbrowser/healthcheck.sh
432
+ ```
433
+
434
+ ---
435
+
436
+ ## Troubleshooting
437
+
438
+ ### Service Won't Start
439
+
440
+ ```bash
441
+ # Check logs
442
+ sudo journalctl -u cbrowser-mcp -n 50 --no-pager
443
+
444
+ # Common fixes:
445
+ # 1. Permission issues
446
+ sudo chown -R $USER:$USER /home/$USER/.cbrowser
447
+ sudo chmod -R 755 /home/$USER/.cbrowser
448
+
449
+ # 2. Missing Playwright browsers
450
+ cd /opt/cbrowser && npx playwright install
451
+
452
+ # 3. Port already in use
453
+ sudo lsof -i :3100
454
+ ```
455
+
456
+ ### "Read-only filesystem" Error
457
+
458
+ The systemd security hardening may be too restrictive:
459
+
460
+ ```bash
461
+ # Check ReadWritePaths includes all needed directories
462
+ sudo systemctl cat cbrowser-mcp | grep ReadWritePaths
463
+ ```
464
+
465
+ ### Browser Timeout Errors
466
+
467
+ ```bash
468
+ # Install all browser dependencies
469
+ npx playwright install-deps
470
+
471
+ # Or install specific deps for Ubuntu
472
+ sudo apt install -y libnss3 libatk1.0-0 libatk-bridge2.0-0 libcups2 \
473
+ libdrm2 libxkbcommon0 libxcomposite1 libxdamage1 libxfixes3 \
474
+ libxrandr2 libgbm1 libpango-1.0-0 libcairo2 libasound2
475
+ ```
476
+
477
+ ### Cloudflare 522 Errors
478
+
479
+ 1. Verify nginx is running: `sudo systemctl status nginx`
480
+ 2. Check CBrowser is listening: `curl localhost:3100/health`
481
+ 3. Check firewall allows 443: `sudo ufw status`
482
+
483
+ ### MCP Connection Fails in Claude
484
+
485
+ 1. Verify URL is correct: `https://your-domain/mcp` (not `/mcp/`)
486
+ 2. Check SSL certificate: `curl -v https://your-domain/health`
487
+ 3. Verify Accept header support (claude.ai sends `Accept: application/json, text/event-stream`)
488
+
489
+ ---
490
+
491
+ ## Updating CBrowser
492
+
493
+ ```bash
494
+ # Stop service
495
+ sudo systemctl stop cbrowser-mcp
496
+
497
+ # Update package
498
+ cd /opt/cbrowser
499
+ npm update cbrowser
500
+
501
+ # Restart service
502
+ sudo systemctl start cbrowser-mcp
503
+
504
+ # Verify version
505
+ curl https://cbrowser-mcp.yourdomain.com/health
506
+ ```
507
+
508
+ ---
509
+
510
+ ## Alternative: Docker Deployment
511
+
512
+ Coming soon. See [Docker documentation](./DOCKER.md).
513
+
514
+ ---
515
+
516
+ ## Getting Help
517
+
518
+ - **Issues:** [GitHub Issues](https://github.com/alexandriashai/cbrowser/issues)
519
+ - **Discussions:** [GitHub Discussions](https://github.com/alexandriashai/cbrowser/discussions)
520
+ - **Examples:** See the `deployment/` directory for reference configs
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "cbrowser",
3
- "version": "7.4.1",
3
+ "version": "7.4.4",
4
4
  "description": "AI-powered browser automation with constitutional safety, AI visual regression, persona testing, and natural language test suites. Modular architecture for visual, testing, analysis, and performance modules.",
5
5
  "main": "dist/index.js",
6
6
  "types": "dist/index.d.ts",
@@ -38,6 +38,8 @@
38
38
  "build": "tsc",
39
39
  "dev": "tsc --watch",
40
40
  "start": "bun run src/cli.ts",
41
+ "mcp": "node dist/mcp-server.js",
42
+ "mcp-remote": "node dist/mcp-server-remote.js",
41
43
  "test": "bun test",
42
44
  "lint": "eslint src/",
43
45
  "clean": "rm -rf dist/",
@@ -53,6 +55,9 @@
53
55
  "user-perspective-testing",
54
56
  "accessibility-testing",
55
57
  "mcp-server",
58
+ "remote-mcp",
59
+ "claude-ai",
60
+ "custom-connector",
56
61
  "claude-integration",
57
62
  "anthropic",
58
63
  "self-healing-selectors",