10 tools from the Hyperbrowser MCP Server, categorised by risk level.
View the Hyperbrowser policy →crawl_webpages Crawl a website starting from a URL and explore linked pages. This tool allows systematic collection of content from multiple pages within a domain... extract_structured_data Extract structured data from a webpage. This tool allows you to extract structured data from a webpage using a schema. list_profiles Lists existing persistent Hyperbrowser profiles, with optional pagination. scrape_webpage Scrape a webpage and extract its content in various formats. This tool allows fetching content from a single URL with configurable browser behavior... search_with_bing Search the web using Bing. This tool allows you to search the web using bing.com 2/5 browser_use_agent This tool employs an open-source browser automation agent optimized specifically for fast, efficient, and cost-effective browser tasks using a clou... 4/5 delete_profile Deletes an existing persistent Hyperbrowser profile. 4/5 openai_computer_use_agent This tool utilizes OpenAI's model to autonomously execute general-purpose browser-based tasks with balanced performance and reliability using a clo... 4/5 The Hyperbrowser MCP server exposes 10 tools across 4 categories: Read, Write, Destructive, Execute.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Hyperbrowser server.
Hyperbrowser tools are categorised as Read (5), Write (1), Destructive (3), Execute (1). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept