VulpineOS
Docs
Runtime
Runtime overview
Hardened browser, orchestrator, MCP
Injection filter
Strip invisible DOM before the agent
Action lock
Freeze JS, timers, reflows mid-think
Optimised DOM
93.1% measured token reduction
Operator surfaces
Web panel
Embedded operator console
TUI workbench
SSH-friendly terminal UI
MCP toolbelt
36 typed browser tools
Vulpine-Box
One-container self-host
Ecosystem
Foxbridge
CDP ↔ Juggler / WebDriver BiDi
vulpine-mark
Set-of-Mark visual labelling
mobilebridge
Android device sessions
OpenClaw
Pre-configured agent loop
Documentation
Quickstart
First agent in 30 seconds
Architecture
Four-phase security model
MCP Reference
All 36 browser tools
Agent Scripting DSL
Declarative agent definitions
Open source
VulpineOS Runtime
GitHub, MPL 2.0
Foxbridge
CDP ↔ Juggler / WebDriver BiDi
vulpine-mark
Set-of-Mark visual labelling
mobilebridge
Android device discovery + sessions
Integrations
OpenClaw
Pre-configured agent loop
Camoufox
Anti-detect browser core
LLM providers
30+ models, one toolbelt
Docker (Vulpine-Box)
One-click self-host
Guides
AI Agent Security
Threat model, mitigations
Prevent Prompt Injection
Hidden DOM, ARIA tricks
OpenClaw + Camoufox
End-to-end setup
Camoufox vs Chrome
Why Firefox, why patches
Engineering
Changelog
Release notes as work lands
Roadmap
Now, next, later, research
Blog
Long-form posts on the runtime
RenderLab
Optional render-diagnostics study
Community
Support
How to get help, fast
GitHub Discussions
Ideas, RFCs, support
Contributing
How to help
Security
Responsible disclosure
Star on GitHub →
VulpineOS vs Browserbase

Open runtime vs hosted Chrome.

Browserbase runs Chrome in their cloud and bills per session-minute. VulpineOS is an open-source operator runtime you self-host, with a Camoufox base and execution primitives Chrome can't ship.

VulpineOS

Open-source operator runtime with C++ stealth + execution patches, self-hosted, billed only on the LLM and infrastructure you bring.

Browserbase

Managed Chrome-as-a-service. You write Playwright code, they run the browser, you pay per session-minute.

browserbase.com ↗
01

Feature comparison

Grouped by what you actually evaluate when picking a runtime for AI browser agents — foundation, execution, identity, density, cost.

Browser foundation
FeatureVulpineOSBrowserbase
Source code is open—
Self-hostable—
Browser engineFirefox 146 (Camoufox)Chromium
Engine-level stealth patchesPARTIAL
Run locally on your laptop—
Execution layer
FeatureVulpineOSBrowserbase
C++ injection-proof a11y filter—
Action-Lock page freeze (nsDocShell)—
Token-optimised DOM export (>90% reduction)—
Loop detector for repeated tool calls—
Identity layer
FeatureVulpineOSBrowserbase
Persistent identities across sessionsPARTIAL
BrowserForge fingerprint pipelinePARTIAL
BYO proxy pool with auto-rotationPARTIAL
Trust-warming background service—
Density layer
FeatureVulpineOSBrowserbase
Pre-warmed context poolPARTIAL
Per-context memory limits—
Multi-agent orchestration built in—
Operator console for hundreds of agents—
Cost model
FeatureVulpineOSBrowserbase
Pay per session-minute—
Pay only for LLM + your own infra—
Free tierSelf-host any volumeLimited
Comparison reflects publicly-available product documentation as of May 2026. We update this page when vendors ship material changes.
02

Pricing model

VulpineOS

Runtime is MPL 2.0 — free to self-host at any scale. The only costs are your infrastructure and your LLM usage. A managed cloud is on the roadmap; current offering is open-source self-host.

Browserbase

Per session-minute pricing on top of plan tiers. Costs scale with both how long sessions are open and how many run concurrently. Browser concurrency is gated by plan.

03

When each one is the right choice

Pick VulpineOS when

  • You need engine-level guarantees. Action-lock and the injection filter are C++ patches. They aren't features you can add to a hosted Chrome — they require shipping a custom browser binary.
  • Density is part of your unit economics. If your agent workload runs hundreds of parallel sessions for hours per identity, per-minute billing dominates. Self-host removes that variable.
  • You want a consolidated runtime. Operator console, MCP toolbelt, agent bus, recording, and session pause/resume are first-class. You don't bolt them on with separate vendors.

Pick Browserbase when

  • You don't want to operate infrastructure. If running a fleet of headless browsers is not your team's competence, a managed service removes a real ops burden.
  • You want managed Chrome specifically. Some workloads target Chrome-only behaviour (extensions, specific DevTools features). VulpineOS is Firefox-based today.
  • Stagehand fits your agent stack. Browserbase ships Stagehand as their agent layer. If you've already built around it, the integration cost is sunk.
04

Interop / migration

Browserbase exposes Playwright-compatible endpoints. VulpineOS does too, via the Foxbridge CDP server — Playwright scripts you wrote against Browserbase will run against VulpineOS with a connection-string change. You don't have to rewrite anything to evaluate side-by-side.

05

FAQ

Is VulpineOS a drop-in replacement for Browserbase?
API-shape, mostly yes — both speak Playwright. Operationally, no — VulpineOS is self-hosted today, so you trade per-minute billing for running your own infrastructure.
Can I use Stagehand-style agent code with VulpineOS?
VulpineOS ships its own MCP toolbelt and agent runtime. Stagehand-compatible bindings aren't shipped, but the underlying browser is Playwright-driveable, so you could port the orchestration layer.
Why Firefox instead of Chrome?
Camoufox (our Firefox base) accepts engine patches we can ship in unified diffs. Chromium's IPC layer makes equivalent action-lock and injection-filter patches harder to maintain across upstream merges. Detection coverage on Firefox is also weaker than on Chrome — the bot-detection vendors have spent more time pattern-matching Chromium automation than Gecko automation.
06

Try it side by side

The fastest way to settle this is a 30-minute side-by-side. VulpineOS is open source — clone, run, point your existing automation at it. We'll happily help you size the comparison if you want.

Read the runtime architectureStar on GitHubTalk to us
VulpineOS

The browser built for AI agents.
Open-source runtime, end to end.

Camoufox 146.0.1
Product
RuntimeAction lockOptimised DOMMCP toolbeltVulpine-Box
Ecosystem
Foxbridgevulpine-markmobilebridgeOpenClawCamoufox
Resources
Resources hubRoadmapChangelogBlogDocs
Community
SupportDiscussionsContributingIssuesSecurity
© 2026 VulpineOSBuilt on Camoufox · Firefox 146.0.1TermsPrivacyCookiesAcceptable useSecurity