VulpineOS
Docs
Runtime
Hardened Browser
Native Firefox patches, C++ injection filter
Action Lock
Freeze JS, timers, reflows mid-think
Optimized DOM
93.1% measured compression
Trust Warming
Long-lived browser identities
Operator surfaces
Web Panel
Fleet view, sessions, approvals
TUI Workbench
SSH-friendly operator terminal
Remote Access
Control plane over the runtime
MCP Toolbelt
36 tools across navigation, audio, mobile
Ecosystem
Foxbridge
CDP to Juggler / WebDriver BiDi
Vulpine Mark
Set-of-mark visual labeling
MobileBridge
iOS & Android device sessions
Vulpine-Box
One-click Docker self-host
Documentation
Quickstart
First agent in 30 seconds
Architecture
Four-phase security model
MCP Reference
All 36 browser tools
Agent Scripting DSL
Declarative agent definitions
Open source
VulpineOS Runtime
GitHub, MPL 2.0
Foxbridge
CDP to Juggler / WebDriver BiDi
Vulpine Mark
Set-of-mark visual labeling
Android MobileBridge
Device discovery & sessions
Integrations
OpenClaw
Pre-configured agent loop
Camoufox
Anti-detect browser core
LLM providers
30+ models, one toolbelt
Docker (Vulpine-Box)
One-click self-host
Guides
AI Agent Security
Threat model, mitigations
Prevent Prompt Injection
Hidden DOM, ARIA tricks
OpenClaw + Camoufox
End-to-end setup
Camoufox vs Chrome
Why Firefox, why patches
Engineering
Changelog
Release notes as work lands
Roadmap
Now, next, later, research
GitHub Releases
Tagged builds and diffs
RenderLab
Optional render diagnostics study
Community
GitHub Discussions
Ideas, RFCs, support
Contributing
How to help
Issues
Bug reports, feature requests
Contact
support@vulpineos.com
Star on GitHub →
Integration · Camoufox

Built on Camoufox, hardened for AI agents.

Camoufox is the open-source, fingerprint-coherent Firefox fork at the core of VulpineOS. We extend it with prompt-injection filtering, deterministic execution, token-optimized DOM export, and identity warming — turning a stealth browser into an agent-grade runtime.

Firefox 146.0.1MPL 2.0Self-hosted
01

What Camoufox is

Camoufox is a fork of Firefox 146.0.1 designed for browser automation that doesn't get fingerprinted out. It rewrites the parts of Firefox that bot detection systems probe — WebGL parameters, font metrics, screen properties, navigator properties — to produce an OS-coherent, indistinguishable-from-real fingerprint.

It's MPL 2.0 licensed, like upstream Firefox. VulpineOS uses it as the rendering and execution surface for every agent.

02

What VulpineOS adds on top

Four security primitives, all applied to the Camoufox base. Each one patches Firefox internals where an extension or wrapper layer can't reach.

01

Phase 1 — Injection-proof accessibility

Strips invisible DOM nodes from the accessibility tree before they reach the agent. Stops indirect prompt injection at the DOM layer, not at the model.

02

Phase 2 — Action lock

Freezes the page completely while the agent is thinking. No JS, no timers, no reflows. Implemented at the C++ docShell level so it can't be bypassed by page script.

03

Phase 3 — Optimized DOM export

Token-compressed semantic snapshot for LLM context. Real benchmark: 93.1% reduction vs Chrome's standard accessibility tree, 74.6% vs Playwright's ariaSnapshot.

04

Phase 4 — Trust warming

Background service that warms browser profiles with human-like interactions while the agent is idle. Off by default; opt-in for long-lived identities.

03

Why a fork instead of an extension

All four primitives patch C++ inside the Firefox core: nsDocShell, the accessibility tree, the refresh driver. Action lock alone is impossible from a WebExtension — you can't suspend the JS event loop from JS. The fork lets us put security where it belongs: below the agent's reach.

VulpineOS contributes upstream where it makes sense. Patches that aren't operator-specific (fingerprint coherence improvements, rendering bug fixes) get sent to Camoufox. The operator-specific ones (action lock, injection filter) live in the VulpineOS patch set.

04

Quick start

  1. 01Clone the runtime — git clone https://github.com/VulpineOS/VulpineOS && cd VulpineOS && make build. The build pulls Firefox 146.0.1, applies our patches, and produces a Camoufox binary.
  2. 02Or pull Vulpine-Box — docker compose up -d. The container ships a pre-built Camoufox + the Go runtime in one image.
  3. 03Run vulpineos. Setup wizard handles model providers; the runtime auto-detects the bundled Camoufox binary.
05

Resources

  • Architecture deep-dive

    docs.vulpineos.com/architecture — every patch and how it wires up.

  • Camoufox vs Chrome

    docs.vulpineos.com/camoufox-vs-chrome — why Firefox, why patches.

  • Upstream Camoufox

    github.com/CloverLabsAI/camoufox — base fork that VulpineOS patches.

  • VulpineOS source

    github.com/VulpineOS/VulpineOS — runtime, patches, and additions.

Self-host an agent-grade Firefox.

Pull the source, build the binary, or run the container. Camoufox plus the four VulpineOS phases, end to end.

Star on GitHub →Read the docs
VulpineOS

The browser built for AI agents.
Open-source runtime, end to end.

Camoufox 146.0.1
Product
DocsArchitectureMCP ToolbeltChangelog
Open source
GitHubFoxbridgeVulpine MarkMobileBridge
Resources
RoadmapAI Agent SecurityPrompt InjectionCamoufox vs Chrome
Community
DiscussionsContributingIssuesContact
© 2026 VulpineOSBuilt on Camoufox · Firefox 146.0.1Privacy & Terms