Browser Stealth Mode
For web data sets, crul's most useful feature is that it provides bindings to remotely control and extract data directly from a web browser (see open
, requests
, scrape
, form
commands). This data can include network requests, performance metrics and rendered HTML in a tabular format.
Remotely controlling a web browser leaves traces called browser fingerprints. Browser fingerprints can be used to distinguish a remotely controlled browser from a normal user controlled web browser.
By default, in Crul 1.1.0 Browser Stealth
mode is enabled, hiding the browser's remote control state by erasing the browser fingerprint that is associated with a non-human user.
Please note: This is kind of a cat and mouse game. It's probably impossible to prevent all ways to detect a remotely controlled web browser, but it is possible to make it difficult and this is what Browser Stealth
mode does.
To disable Browser Stealth
mode, edit the packages/krull/.env
setting:
STEALTH_PLUGIN_ENABLED = false