VulpineOS
Docs
Runtime
Runtime overview
Hardened browser, orchestrator, MCP
Injection filter
Strip invisible DOM before the agent
Action lock
Freeze JS, timers, reflows mid-think
Optimised DOM
93.1% measured token reduction
Operator surfaces
Web panel
Embedded operator console
TUI workbench
SSH-friendly terminal UI
MCP toolbelt
36 typed browser tools
Vulpine-Box
One-container self-host
Ecosystem
Foxbridge
CDP ↔ Juggler / WebDriver BiDi
vulpine-mark
Set-of-Mark visual labelling
mobilebridge
Android device sessions
OpenClaw
Pre-configured agent loop
Documentation
Quickstart
First agent in 30 seconds
Architecture
Four-phase security model
MCP Reference
All 36 browser tools
Agent Scripting DSL
Declarative agent definitions
Open source
VulpineOS Runtime
GitHub, MPL 2.0
Foxbridge
CDP ↔ Juggler / WebDriver BiDi
vulpine-mark
Set-of-Mark visual labelling
mobilebridge
Android device discovery + sessions
Integrations
OpenClaw
Pre-configured agent loop
Camoufox
Anti-detect browser core
LLM providers
30+ models, one toolbelt
Docker (Vulpine-Box)
One-click self-host
Guides
AI Agent Security
Threat model, mitigations
Prevent Prompt Injection
Hidden DOM, ARIA tricks
OpenClaw + Camoufox
End-to-end setup
Camoufox vs Chrome
Why Firefox, why patches
Engineering
Changelog
Release notes as work lands
Roadmap
Now, next, later, research
Blog
Long-form posts on the runtime
RenderLab
Optional render-diagnostics study
Community
Support
How to get help, fast
GitHub Discussions
Ideas, RFCs, support
Contributing
How to help
Security
Responsible disclosure
Star on GitHub →
Product · Runtime

The runtime, end to end.

VulpineOS is a hardened Camoufox-based browser, a multi-agent orchestrator, a 36-tool MCP bridge, a web panel, a terminal workbench, and a Go runtime that ties it all together. Self-host the whole stack.

Open source · MPL 2.0Self-hostedBring your own keys
01

What it is

The runtime spawns Firefox-based Camoufox processes, attaches the Juggler automation protocol, and hands them to OpenClaw — the agent loop — through Foxbridge's CDP-translation layer. Every browser session is identity-scoped, fingerprint-coherent, and security-hardened by four C++ patches that ship with the build.

On top of that you get a multi-agent orchestrator, a vault for persistent identities, a 36-tool MCP toolbelt, cost tracking, agent-bus policies, recordings, and a script DSL for repeatable browser tasks that don't burn LLM tokens.

01

Hardened Camoufox

Firefox 146.0.1 fork with four operator-grade security primitives baked into the C++ core.

02

Multi-agent orchestrator

Spawn, pause, resume, kill hundreds of agents from one process. Sessions persist across restarts.

03

Identity vault

Cookies, localStorage, fingerprints, and proxy assignments per citizen. SQLite via pure-Go modernc.

04

MCP toolbelt

36 typed browser tools exposed over Model Context Protocol. Any MCP client can drive a session.

02

How it fits together

One Camoufox process is shared across every operator surface, with Foxbridge bridging CDP-native agents into the same browser contexts the TUI and MCP server already see.

Kernel  →  Camoufox (single process)  →  Juggler pipe  →  juggler.Client
                                                          ├──  TUI  (direct Juggler calls)
                                                          ├──  MCP server  (browser tools over MCP)
                                                          └──  Foxbridge CDP server  :9222
                                                                  └──  OpenClaw (cdpUrl)  →  same contexts
Architecture · one Camoufox, many operator surfaces
03

Lifecycle

The orchestrator allocates contexts from a pre-warmed pool, applies the citizen's fingerprint, and hands the session off to the agent. When the agent finishes, the context is recycled — capped at 50 uses to avoid memory drift, monitored for per-context memory limits, and torn down with full process-group cleanup.

04

Quick start

  1. 01Clone the repo — git clone https://github.com/VulpineOS/VulpineOS.
  2. 02Build — make fetch && make setup && make dir && make build (artifact builds finish in under 5 minutes on Apple silicon).
  3. 03Run — ./vulpineos boots the orchestrator, the MCP bridge, and the TUI in one process.
05

Resources

  • Architecture deep-dive

    docs.vulpineos.com/architecture — every patch, where it lives, and why.

  • VulpineOS source

    github.com/VulpineOS/VulpineOS — runtime, patches, additions.

Self-host the runtime today.

Pull the source, build the binary, and drive your first agent. The waitlist gates the managed runtime; the open-source path is open now.

Read the docs→Star on GitHub
VulpineOS

The browser built for AI agents.
Open-source runtime, end to end.

Camoufox 146.0.1
Product
RuntimeAction lockOptimised DOMMCP toolbeltVulpine-Box
Ecosystem
Foxbridgevulpine-markmobilebridgeOpenClawCamoufox
Resources
Resources hubRoadmapChangelogBlogDocs
Community
SupportDiscussionsContributingIssuesSecurity
© 2026 VulpineOSBuilt on Camoufox · Firefox 146.0.1TermsPrivacyCookiesAcceptable useSecurity