Browser (bot-managed)
Integrated browser control server + action commands
Browser (bot-managed)
Bot can run a dedicated Chrome/Brave/Edge/Chromium profile that the agent controls. It is isolated from your personal browser and is managed through a small local control server.
Beginner view:
- Think of it as a separate, agent-only browser.
- The
botprofile does not touch your personal browser profile. - The agent can open tabs, read pages, click, and type in a safe lane.
- The default
chromeprofile uses the system default Chromium browser via the extension relay; switch tobotfor the isolated managed browser.
What you get
- A separate browser profile named bot (orange accent by default).
- Deterministic tab control (list/open/focus/close).
- Agent actions (click/type/drag/select), snapshots, screenshots, PDFs.
- Optional multi-profile support (
bot,work,remote, ...).
This browser is not your daily driver. It is a safe, isolated surface for agent automation and verification.
Quick start
bot browser --browser-profile bot status
bot browser --browser-profile bot start
bot browser --browser-profile bot open https://example.com
bot browser --browser-profile bot snapshotIf you get “Browser disabled”, enable it in config (see below) and restart the Gateway.
Profiles: bot vs chrome
bot: managed, isolated browser (no extension required).chrome: extension relay to your system browser (requires the Bot extension to be attached to a tab).
Set browser.defaultProfile: "bot" if you want managed mode by default.
Configuration
Browser settings live in ~/.bot/bot.json.
{
browser: {
enabled: true, // default: true
controlUrl: "http://127.0.0.1:18791",
cdpUrl: "http://127.0.0.1:18792", // defaults to controlUrl + 1
remoteCdpTimeoutMs: 1500, // remote CDP HTTP timeout (ms)
remoteCdpHandshakeTimeoutMs: 3000, // remote CDP WebSocket handshake timeout (ms)
defaultProfile: "chrome",
color: "#FF4500",
headless: false,
noSandbox: false,
attachOnly: false,
executablePath: "/Applications/Brave Browser.app/Contents/MacOS/Brave Browser",
profiles: {
bot: { cdpPort: 18800, color: "#FF4500" },
work: { cdpPort: 18801, color: "#0066CC" },
remote: { cdpUrl: "http://10.0.0.42:9222", color: "#00AA00" }
}
}
}Notes:
controlUrldefaults tohttp://127.0.0.1:18791.- If you override the Gateway port (
gateway.portorBOT_GATEWAY_PORT), the default browser ports shift to stay in the same “family” (control = gateway + 2). cdpUrldefaults tocontrolUrl + 1when unset.remoteCdpTimeoutMsapplies to remote (non-loopback) CDP reachability checks.remoteCdpHandshakeTimeoutMsapplies to remote CDP WebSocket reachability checks.attachOnly: truemeans “never launch a local browser; only attach if it is already running.”color+ per-profilecolortint the browser UI so you can see which profile is active.- Default profile is
chrome(extension relay). UsedefaultProfile: "bot"for the managed browser. - Auto-detect order: system default browser if Chromium-based; otherwise Chrome → Brave → Edge → Chromium → Chrome Canary.
- Local
botprofiles auto-assigncdpPort/cdpUrl— set those only for remote CDP.
Use Brave (or another Chromium-based browser)
If your system default browser is Chromium-based (Chrome/Brave/Edge/etc),
Bot uses it automatically. Set browser.executablePath to override
auto-detection:
CLI example:
bot config set browser.executablePath "/usr/bin/google-chrome"// macOS
{
browser: {
executablePath: "/Applications/Brave Browser.app/Contents/MacOS/Brave Browser"
}
}
// Windows
{
browser: {
executablePath: "C:\\Program Files\\BraveSoftware\\Brave-Browser\\Application\\brave.exe"
}
}
// Linux
{
browser: {
executablePath: "/usr/bin/brave-browser"
}
}Local vs remote control
- Local control (default):
controlUrlis loopback (127.0.0.1/localhost). The Gateway starts the control server and can launch a local browser. - Remote control:
controlUrlis non-loopback. The Gateway does not start a local server; it assumes you are pointing at an existing server elsewhere. - Remote CDP: set
browser.profiles.<name>.cdpUrl(orbrowser.cdpUrl) to attach to a remote Chromium-based browser. In this case, Bot will not launch a local browser.
Remote browser (control server)
You can run the browser control server on another machine and point your
Gateway at it with a remote controlUrl. This lets the agent drive a browser
outside the host (lab box, VM, remote desktop, etc.).
Key points:
- The control server speaks to Chromium-based browsers (Chrome/Brave/Edge/Chromium) via CDP.
- The Gateway only needs the HTTP control URL.
- Profiles are resolved on the control server side.
Example:
{
browser: {
enabled: true,
controlUrl: "http://10.0.0.42:18791",
defaultProfile: "work"
}
}Use profiles.<name>.cdpUrl for remote CDP if you want the Gateway to talk
directly to a Chromium-based browser instance without a remote control server.
Remote CDP URLs can include auth:
- Query tokens (e.g.,
https://provider.example?token=<token>) - HTTP Basic auth (e.g.,
https://user:pass@provider.example)
Bot preserves the auth when calling /json/* endpoints and when connecting
to the CDP WebSocket. Prefer environment variables or secrets managers for
tokens instead of committing them to config files.
Node browser proxy (zero-config default)
If you run a node host on the machine that has your browser, Bot can
auto-route browser tool calls to that node without any custom controlUrl
setup. This is the default path for remote gateways.
Notes:
- The node host exposes its local browser control server via a proxy command.
- Profiles come from the node’s own
browser.profilesconfig (same as local). - Disable if you don’t want it:
- On the node:
nodeHost.browserProxy.enabled=false - On the gateway:
gateway.nodes.browser.mode="off"
- On the node:
Browserless (hosted remote CDP)
Browserless is a hosted Chromium service that exposes CDP endpoints over HTTPS. You can point a Bot browser profile at a Browserless region endpoint and authenticate with your API key.
Example:
{
browser: {
enabled: true,
defaultProfile: "browserless",
remoteCdpTimeoutMs: 2000,
remoteCdpHandshakeTimeoutMs: 4000,
profiles: {
browserless: {
cdpUrl: "https://production-sfo.browserless.io?token=<BROWSERLESS_API_KEY>",
color: "#00AA00"
}
}
}
}Notes:
- Replace
<BROWSERLESS_API_KEY>with your real Browserless token. - Choose the region endpoint that matches your Browserless account (see their docs).
Running the control server on the browser machine
Run a standalone browser control server (recommended when your Gateway is remote):
# on the machine that runs Chrome/Brave/Edge
bot browser serve --bind <browser-host> --port 18791 --token <token>Then point your Gateway at it:
{
browser: {
enabled: true,
controlUrl: "http://<browser-host>:18791",
// Option A (recommended): keep token in env on the Gateway
// (avoid writing secrets into config files)
// controlToken: "<token>"
}
}And set the auth token in the Gateway environment:
export BOT_BROWSER_CONTROL_TOKEN="<token>"Option B: store the token in the Gateway config instead (same shared token):
{
browser: {
enabled: true,
controlUrl: "http://<browser-host>:18791",
controlToken: "<token>"
}
}Security
This section covers the browser control server (browser.controlUrl) used for agent browser automation.
Key ideas:
- Treat the browser control server like an admin API: private network only.
- Use token auth always when the server is reachable off-machine.
- Prefer Tailnet-only connectivity over LAN exposure.
Tokens (what is shared with what?)
browser.controlToken/BOT_BROWSER_CONTROL_TOKENis only for authenticating browser control HTTP requests tobrowser.controlUrl.- It is not the Gateway token (
gateway.auth.token) and not a node pairing token. - You can reuse the same string value, but it’s better to keep them separate to reduce blast radius.
Binding (don’t expose to your LAN by accident)
Recommended:
- Keep
bot browser servebound to loopback (127.0.0.1) and publish it via Tailscale. - Or bind to a Tailnet IP only (never
0.0.0.0) and require a token.
Avoid:
--bind 0.0.0.0(LAN-visible). Even with token auth, traffic is plain HTTP unless you also add TLS.
TLS / HTTPS (recommended approach: terminate in front)
Best practice here: keep bot browser serve on HTTP and terminate TLS in front.
If you’re already using Tailscale, you have two good options:
- Tailnet-only, still HTTP (transport is encrypted by Tailscale):
- Keep
controlUrlashttp://…but ensure it’s only reachable over your tailnet.
- Serve HTTPS via Tailscale (nice UX:
https://…URL):
# on the browser machine
bot browser serve --bind 127.0.0.1 --port 18791 --token <token>
tailscale serve https / http://127.0.0.1:18791Then set your Gateway config browser.controlUrl to the HTTPS URL (MagicDNS/ts.net) and keep using the same token.
Notes:
- Do not use Tailscale Funnel for this unless you explicitly want to make the endpoint public.
- For Tailnet setup/background, see Gateway web surfaces and the Gateway CLI.
Profiles (multi-browser)
Bot supports multiple named profiles (routing configs). Profiles can be:
- bot-managed: a dedicated Chromium-based browser instance with its own user data directory + CDP port
- remote: an explicit CDP URL (Chromium-based browser running elsewhere)
- extension relay: your existing Chrome tab(s) via the local relay + Chrome extension
Defaults:
- The
botprofile is auto-created if missing. - The
chromeprofile is built-in for the Chrome extension relay (points athttp://127.0.0.1:18792by default). - Local CDP ports allocate from 18800–18899 by default.
- Deleting a profile moves its local data directory to Trash.
All control endpoints accept ?profile=<name>; the CLI uses --browser-profile.
Chrome extension relay (use your existing Chrome)
Bot can also drive your existing Chrome tabs (no separate “bot” Chrome instance) via a local CDP relay + a Chrome extension.
Full guide: Chrome extension
Flow:
- You run a browser control server (Gateway on the same machine, or
bot browser serve). - A local relay server listens at a loopback
cdpUrl(default:http://127.0.0.1:18792). - You click the Bot Browser Relay extension icon on a tab to attach (it does not auto-attach).
- The agent controls that tab via the normal
browsertool, by selecting the right profile.
If the Gateway runs on the same machine as Chrome (default setup), you usually do not need bot browser serve.
Use browser serve only when the Gateway runs elsewhere (remote mode).
Sandboxed sessions
If the agent session is sandboxed, the browser tool may default to target="sandbox" (sandbox browser).
Chrome extension relay takeover requires host browser control, so either:
- run the session unsandboxed, or
- set
agents.defaults.sandbox.browser.allowHostControl: trueand usetarget="host"when calling the tool.
Setup
- Load the extension (dev/unpacked):
bot browser extension install- Chrome →
chrome://extensions→ enable “Developer mode” - “Load unpacked” → select the directory printed by
bot browser extension path - Pin the extension, then click it on the tab you want to control (badge shows
ON).
- Use it:
- CLI:
bot browser --browser-profile chrome tabs - Agent tool:
browserwithprofile="chrome"
Optional: if you want a different name or relay port, create your own profile:
bot browser create-profile \
--name my-chrome \
--driver extension \
--cdp-url http://127.0.0.1:18792 \
--color "#00AA00"Notes:
- This mode relies on Playwright-on-CDP for most operations (screenshots/snapshots/actions).
- Detach by clicking the extension icon again.
Isolation guarantees
- Dedicated user data dir: never touches your personal browser profile.
- Dedicated ports: avoids
9222to prevent collisions with dev workflows. - Deterministic tab control: target tabs by
targetId, not “last tab”.
Browser selection
When launching locally, Bot picks the first available:
- Chrome
- Brave
- Edge
- Chromium
- Chrome Canary
You can override with browser.executablePath.
Platforms:
- macOS: checks
/Applicationsand~/Applications. - Linux: looks for
google-chrome,brave,microsoft-edge,chromium, etc. - Windows: checks common install locations.
Control API (optional)
If you want to integrate directly, the browser control server exposes a small HTTP API:
- Status/start/stop:
GET /,POST /start,POST /stop - Tabs:
GET /tabs,POST /tabs/open,POST /tabs/focus,DELETE /tabs/:targetId - Snapshot/screenshot:
GET /snapshot,POST /screenshot - Actions:
POST /navigate,POST /act - Hooks:
POST /hooks/file-chooser,POST /hooks/dialog - Downloads:
POST /download,POST /wait/download - Debugging:
GET /console,POST /pdf - Debugging:
GET /errors,GET /requests,POST /trace/start,POST /trace/stop,POST /highlight - Network:
POST /response/body - State:
GET /cookies,POST /cookies/set,POST /cookies/clear - State:
GET /storage/:kind,POST /storage/:kind/set,POST /storage/:kind/clear - Settings:
POST /set/offline,POST /set/headers,POST /set/credentials,POST /set/geolocation,POST /set/media,POST /set/timezone,POST /set/locale,POST /set/device
All endpoints accept ?profile=<name>.
Playwright requirement
Some features (navigate/act/AI snapshot/role snapshot, element screenshots, PDF) require Playwright. If Playwright isn’t installed, those endpoints return a clear 501 error. ARIA snapshots and basic screenshots still work for bot-managed Chrome. For the Chrome extension relay driver, ARIA snapshots and screenshots require Playwright.
If you see Playwright is not available in this gateway build, install the full
Playwright package (not playwright-core) and restart the gateway, or reinstall
Bot with browser support.
How it works (internal)
High-level flow:
- A small control server accepts HTTP requests.
- It connects to Chromium-based browsers (Chrome/Brave/Edge/Chromium) via CDP.
- For advanced actions (click/type/snapshot/PDF), it uses Playwright on top of CDP.
- When Playwright is missing, only non-Playwright operations are available.
This design keeps the agent on a stable, deterministic interface while letting you swap local/remote browsers and profiles.
CLI quick reference
All commands accept --browser-profile <name> to target a specific profile.
All commands also accept --json for machine-readable output (stable payloads).
Basics:
bot browser statusbot browser startbot browser stopbot browser tabsbot browser tabbot browser tab newbot browser tab select 2bot browser tab close 2bot browser open https://example.combot browser focus abcd1234bot browser close abcd1234
Inspection:
bot browser screenshotbot browser screenshot --full-pagebot browser screenshot --ref 12bot browser screenshot --ref e12bot browser snapshotbot browser snapshot --format aria --limit 200bot browser snapshot --interactive --compact --depth 6bot browser snapshot --efficientbot browser snapshot --labelsbot browser snapshot --selector "#main" --interactivebot browser snapshot --frame "iframe#main" --interactivebot browser console --level errorbot browser errors --clearbot browser requests --filter api --clearbot browser pdfbot browser responsebody "**/api" --max-chars 5000
Actions:
bot browser navigate https://example.combot browser resize 1280 720bot browser click 12 --doublebot browser click e12 --doublebot browser type 23 "hello" --submitbot browser press Enterbot browser hover 44bot browser scrollintoview e12bot browser drag 10 11bot browser select 9 OptionA OptionBbot browser download e12 /tmp/report.pdfbot browser waitfordownload /tmp/report.pdfbot browser upload /tmp/file.pdfbot browser fill --fields '[{"ref":"1","type":"text","value":"Ada"}]'bot browser dialog --acceptbot browser wait --text "Done"bot browser wait "#main" --url "**/dash" --load networkidle --fn "window.ready===true"bot browser evaluate --fn '(el) => el.textContent' --ref 7bot browser highlight e12bot browser trace startbot browser trace stop
State:
bot browser cookiesbot browser cookies set session abc123 --url "https://example.com"bot browser cookies clearbot browser storage local getbot browser storage local set theme darkbot browser storage session clearbot browser set offline onbot browser set headers --json '{"X-Debug":"1"}'bot browser set credentials user passbot browser set credentials --clearbot browser set geo 37.7749 -122.4194 --origin "https://example.com"bot browser set geo --clearbot browser set media darkbot browser set timezone America/New_Yorkbot browser set locale en-USbot browser set device "iPhone 14"
Notes:
uploadanddialogare arming calls; run them before the click/press that triggers the chooser/dialog.uploadcan also set file inputs directly via--input-refor--element.snapshot:--format ai(default when Playwright is installed): returns an AI snapshot with numeric refs (aria-ref="<n>").--format aria: returns the accessibility tree (no refs; inspection only).--efficient(or--mode efficient): compact role snapshot preset (interactive + compact + depth + lower maxChars).- Config default (tool/CLI only): set
browser.snapshotDefaults.mode: "efficient"to use efficient snapshots when the caller does not pass a mode (see Gateway configuration). - Role snapshot options (
--interactive,--compact,--depth,--selector) force a role-based snapshot with refs likeref=e12. --frame "<iframe selector>"scopes role snapshots to an iframe (pairs with role refs likee12).--interactiveoutputs a flat, easy-to-pick list of interactive elements (best for driving actions).--labelsadds a viewport-only screenshot with overlayed ref labels (printsMEDIA:<path>).
click/type/etc require areffromsnapshot(either numeric12or role refe12). CSS selectors are intentionally not supported for actions.
Snapshots and refs
Bot supports two “snapshot” styles:
-
AI snapshot (numeric refs):
bot browser snapshot(default;--format ai)- Output: a text snapshot that includes numeric refs.
- Actions:
bot browser click 12,bot browser type 23 "hello". - Internally, the ref is resolved via Playwright’s
aria-ref.
-
Role snapshot (role refs like
e12):bot browser snapshot --interactive(or--compact,--depth,--selector,--frame)- Output: a role-based list/tree with
[ref=e12](and optional[nth=1]). - Actions:
bot browser click e12,bot browser highlight e12. - Internally, the ref is resolved via
getByRole(...)(plusnth()for duplicates). - Add
--labelsto include a viewport screenshot with overlayede12labels.
- Output: a role-based list/tree with
Ref behavior:
- Refs are not stable across navigations; if something fails, re-run
snapshotand use a fresh ref. - If the role snapshot was taken with
--frame, role refs are scoped to that iframe until the next role snapshot.
Wait power-ups
You can wait on more than just time/text:
- Wait for URL (globs supported by Playwright):
bot browser wait --url "**/dash"
- Wait for load state:
bot browser wait --load networkidle
- Wait for a JS predicate:
bot browser wait --fn "window.ready===true"
- Wait for a selector to become visible:
bot browser wait "#main"
These can be combined:
bot browser wait "#main" \
--url "**/dash" \
--load networkidle \
--fn "window.ready===true" \
--timeout-ms 15000Debug workflows
When an action fails (e.g. “not visible”, “strict mode violation”, “covered”):
bot browser snapshot --interactive- Use
click <ref>/type <ref>(prefer role refs in interactive mode) - If it still fails:
bot browser highlight <ref>to see what Playwright is targeting - If the page behaves oddly:
bot browser errors --clearbot browser requests --filter api --clear
- For deep debugging: record a trace:
bot browser trace start- reproduce the issue
bot browser trace stop(printsTRACE:<path>)
JSON output
--json is for scripting and structured tooling.
Examples:
bot browser status --json
bot browser snapshot --interactive --json
bot browser requests --filter api --json
bot browser cookies --jsonRole snapshots in JSON include refs plus a small stats block (lines/chars/refs/interactive) so tools can reason about payload size and density.
State and environment knobs
These are useful for “make the site behave like X” workflows:
- Cookies:
cookies,cookies set,cookies clear - Storage:
storage local|session get|set|clear - Offline:
set offline on|off - Headers:
set headers --json '{"X-Debug":"1"}'(or--clear) - HTTP basic auth:
set credentials user pass(or--clear) - Geolocation:
set geo <lat> <lon> --origin "https://example.com"(or--clear) - Media:
set media dark|light|no-preference|none - Timezone / locale:
set timezone ...,set locale ... - Device / viewport:
set device "iPhone 14"(Playwright device presets)set viewport 1280 720
Security & privacy
- The bot browser profile may contain logged-in sessions; treat it as sensitive.
- For logins and anti-bot notes (X/Twitter, etc.), see Browser login + X/Twitter posting.
- Keep control URLs loopback-only unless you intentionally expose the server.
- Remote CDP endpoints are powerful; tunnel and protect them.
Troubleshooting
For Linux-specific issues (especially snap Chromium), see Browser troubleshooting.
Agent tools + how control works
The agent gets one tool for browser automation:
browser— status/start/stop/tabs/open/focus/close/snapshot/screenshot/navigate/act
How it maps:
browser snapshotreturns a stable UI tree (AI or ARIA).browser actuses the snapshotrefIDs to click/type/drag/select.browser screenshotcaptures pixels (full page or element).browseraccepts:profileto choose a named browser profile (host or remote control server).target(sandbox|host|custom) to select where the browser lives.controlUrlsetstarget: "custom"implicitly (remote control server).- In sandboxed sessions,
target: "host"requiresagents.defaults.sandbox.browser.allowHostControl=true. - If
targetis omitted: sandboxed sessions default tosandbox, non-sandbox sessions default tohost. - Sandbox allowlists can restrict
target: "custom"to specific URLs/hosts/ports. - Defaults: allowlists unset (no restriction), and sandbox host control is disabled.
This keeps the agent deterministic and avoids brittle selectors.
Last updated on