6 tools from the Playwright Stealth MCP Server, categorised by risk level.
View the Playwright Stealth policy →browser_get_state Get the current browser state.
Returns information about the current browser session including the URL, page title, and whether a browser is open.... browser_screenshot Take a screenshot of the current page, a specific element, or a page region.
Captures the visible viewport, full page, a specific element, or a re... browser_execute Execute Playwright code in the browser.
This tool runs JavaScript code with access to a Playwright `page` object. The browser session persists acr... 4/5 browser_start_recording Start recording the browser session as a video.
This tool begins capturing all browser interactions as a WebM video file. It works by recycling th... 3/5 browser_stop_recording Stop recording the browser session and save the video.
This tool stops the active video recording, saves the video file, and returns a resource UR... 3/5 The Playwright Stealth MCP server exposes 6 tools across 3 categories: Read, Write, Execute.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Playwright Stealth server.
Playwright Stealth tools are categorised as Read (2), Write (1), Execute (3). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept