Hacker Newsnew | past | comments | ask | show | jobs | submit | LarsenCC's commentslogin

PW is usually easier to detect. Using raw CDP is in our opinion much better for this.

We published a survey of stealth browsers just yesterday https://botforensics.com/blog/stealth-browser-survey-april-2...

There's still plenty that Browser-Use could improve in terms of stealthiness.

We didn't detect it using CDP (good!) but can still detect that it is Browser-Use.


This is an advertisement that looks like a technical blogpost for a moment.

So only a stealth advantage?

Lmaooo.

Curious why? You can just take this and run locally or deploy anywhere you'd like with any provider agent provider.

Hey! Where did you submit this exactly? Can you provide a link? Will ask others on the team also, but I am not sure what you are referring to.

Agreed, the pattern is converging across the industry. The Unikraft setup is where it gets interesting for us with sub-second boots (or sub 100ms even), scale-to-zero that suspends the VM after a few seconds of idle (frees resources), and dedicated bare metal in AWS so we're not sharing hardware.

We haven't open-sourced the control plane glue yet but it's something we're thinking about. browser-use itself is open source. The sandbox infra on top is the proprietary part for now.


Exactly, this is the very stuff I'd be interested to hear more about. Great work on all this btw and best of luck going forward!


Fair point, and you're right that those three steps alone aren't a security boundary. They're defense-in-depth, not the primary isolation.

The actual security model is the architecture itself: the sandbox runs in its own VM inside a private VPC. It has no AWS keys, no database credentials, no LLM API tokens. The only thing it can do is talk to the control plane, which validates every request and scopes every operation to that one session.

So even if you bypass all three hardening steps, you get a session token that only works inside that VPC, talking to a control plane that only lets you do things scoped to your own session. There's nothing to escalate to.

The bytecode removal, privilege drop, and env stripping are just there to make the agent's life harder if it tries to inspect its own runtime. Not the security boundary.


Man I was also surprised haha


So cool!


I was thinking of doing a really simple app to just capture your txs after you have paid at e.g. the grocery store. Maybe I will build it some time in the future.

A TG bot also seems interesting ngl


It's just a premade spreadsheet indeed.


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: