camofox-browser with OpenClaw

Headless browser for protected sites — C++ fingerprint spoofing

camofox-browser is an OpenClaw plugin that runs a headless browser server built on Camoufox—a Firefox fork that spoofs browser fingerprints at the C++ level rather than in JavaScript. That makes it harder for detection systems to spot, so your agent can interact with sites like X.com (Twitter), Product Hunt, Amazon, and LinkedIn that normally block standard headless Chrome.

It exposes tools such as camofox_create_tab, camofox_snapshot, camofox_click, and camofox_navigate, and returns accessibility snapshots (much smaller than full HTML) for LLM context. Best for interactive browsing on a VPS or remote server where standard browsers get 403 or Cloudflare challenges.

Installation

Install camofox-browser
openclaw plugins install @askjo/camofox-browser

See the camofox-browser repo for setup and configuration. This site does not endorse or maintain third-party plugins.

When to Use camofox-browser

  • Interactive browsing — Click, fill forms, navigate on protected sites
  • X.com (Twitter) — Read threads, profiles, posts
  • Product Hunt, Amazon — Access product pages and listings
  • LinkedIn — With appropriate auth
  • VPS/headless — Where standard Chrome is blocked by 403 or Cloudflare

camofox-browser vs Other Options

  • camofox-browser — Interactive browsing with C++ fingerprint spoofing. Best for click, fill, navigate on protected sites.
  • GhostFetch — Stealth fetch, returns Markdown. Best for "get this page's text" in one shot.
  • PinchTab — Token-efficient Chrome control. Works on many sites; may fail on heavily protected ones.
  • Built-in browser — Default option. Often blocked on X, LinkedIn, Product Hunt.

Related