I've been building browser automation agents with Playwright and the detection cat-and-mouse game is real. The C++ level overrides are interesting but I'm curious how this holds up against Cloudflare's latest checks - they're not just looking at navigator properties anymore, they're timing canvas operations and checking for inconsistencies in the rendering pipeline. Have you tested this against any real-world bot detection beyond the basic fingerprinting libs?
I've been building browser automation agents with Playwright and the detection cat-and-mouse game is real. The C++ level overrides are interesting but I'm curious how this holds up against Cloudflare's latest checks - they're not just looking at navigator properties anymore, they're timing canvas operations and checking for inconsistencies in the rendering pipeline. Have you tested this against any real-world bot detection beyond the basic fingerprinting libs?
Just ran evals on a few detectors, and clark-browser passed live stealth checks on Cloudflare smoke, SannySoft, BrowserLeaks Client Hints, and WebGL.
Results + new binary https://github.com/clark-labs-inc/clark-browser
Hmm how does it differ from this: https://github.com/daijro/camoufox
clark-browser is c++ level overwrite of core chromium parts