vessel-browser
Built from the ground-up for agents, Vessel Browser is an open source AI browser for Linux/Windows that provides a durable state, MCP control, and BYOK with full autonomous browsing. Use with Hermes Agent, OpenClaw, or connect to your favorite API provider.
Open source chromium-based browser for persistent web agents on Linux (Mac/Windows support to come).
Vessel gives external agent harnesses a real browser with durable state, MCP control, and a human-visible supervisory UI. It is built for long-running workflows where the agent drives and the human audits, intervenes, and redirects when needed.
- Built for agent harnesses such as Hermes Agent, OpenClaw, and other MCP clients
- Keeps browser state alive with named sessions, bookmarks, checkpoints, and structured page visibility
- Keeps humans in the loop with approvals, runtime controls, and a visible browser instead of a headless black box
Vessel is in active development and currently makes no security assurances. Use and deploy it with care.
https://github.com/user-attachments/assets/0a72b48a-873a-4eb0-b8f2-23e34d8472c4
Quick Start
Fastest Install Today
Linux AppImage from GitHub Releases:
- Download the latest
Vessel-<version>-x64.AppImage - Mark it executable:
chmod +x Vessel-*.AppImage - Launch it:
./Vessel-*.AppImage - Open Settings (
Ctrl+,) and confirm the MCP endpoint shown there
Install via npm
npm install -g @quanta-intellect/vessel-browser
vessel-browser
Or run it directly without installing:
npx @quanta-intellect/vessel-browser
Source Install
curl -fsSL https://raw.githubusercontent.com/unmodeled-tyler/quanta-vessel-browser/main/scripts/install.sh | bash
Development From Source
npm install
npm run dev
If you want extra local AI tracing in development, create an optional src/main/telemetry/trace-logger.local.cjs file. Vessel will load it only in local dev builds, and packaged production builds ignore it.
Why Vessel?
Most browser automation stacks are either headless, stateless, or designed around a human as the primary operator. Vessel is built around the opposite model: the browser is the agent's operating surface, and the human stays in the loop through a visible interface with clear supervisory controls.
Vessel is built for persistent web agents that need a real browser, durable state, and a human-visible interface. The agent is the primary operator. The human follows along in the live browser UI, audits what the agent is doing, and steers when needed.
Today, Vessel provides the browser shell, page visibility, and supervisory surfaces needed to support that model. The long-term goal is not "a browser with AI features," but a browser runtime for autonomous agents with a clear supervisory experience for humans.
Features
- Agent-first browser model — Vessel is designed around an agent driving the browser while a human watches, intervenes, and redirects
- Human-visible browser UI — pages render like a normal browser so agent activity stays legible instead of disappearing into a headless run
- Command Bar (
Ctrl+L) — a secondary operator surface for harness-driven workflows and future runtime commands - Supervisor Sidebar (
Ctrl+Shift+L) — live supervision across five tabs: Supervisor, Bookmarks, Checkpoints, Chat, and Automate - Chat Assistant — built-in conversational AI in the sidebar Chat tab; supports Anthropic, OpenAI, Ollama, Mistral, xAI, Google Gemini, OpenRouter, and any OpenAI-compatible endpoint; reads the current page automatically; has full access to the same browser tools as external agents; multi-turn session history; configure provider, model, and API key in Settings
- Automation Kits (Premium) — parameterized workflow templates in the sidebar Automate tab; fill in a short form and the built-in agent executes the workflow autonomously; bundled kits include Research & Collect (multi-source research with bookmark saving) and Price Scout (cross-retailer price comparison); designed for a future kit marketplace
- Dev Tools Panel (
F12) — inspect console output, network requests, and MCP/agent activity in a resizable panel at the bottom of the window; export logs by category and date range as JSON - Bookmarks for Agents — save pages into folders, attach one-line folder summaries, and search bookmarks over MCP instead of dumping the entire library
- Named Session Persistence — save cookies, localStorage, and current tab layout under a reusable name, then reload it after a restart
- Page Highlights — agents can visually highlight text or elements on any page with labeled, color-coded markers that persist across navigation; highlight count and navigation controls appear in the sidebar; cleared explicitly or via tool call
- Agent Transcript Dock — floating transcript overlay anchored to the browser chrome; configurable display modes (off, summary, full) set in Settings; shows live agent thinking and status updates without occupying sidebar space
- Workflow Flow Tracking — agents can declare a named multi-step workflow at runtime using
flow_start; progress is tracked step-by-step withflow_advanceand visible in the sidebar throughout execution - Structured Page Visibility Context — extraction can report in-viewport elements, obscured controls, active overlays, and dormant consent/modal UI
- Popup Recovery Tools — agents can explicitly dismiss common popups, newsletter gates, and consent walls instead of brute-forcing generic clicks
- Per-Tab Ad Blocking Controls — tabs default to ad blocking on, but agents can selectively disable and re-enable blocking when a page misbehaves
- Domain Policy — allowlist or blocklist domains globally in Settings; agents cannot navigate to blocked domains
- Agent Credential Vault (Premium) — encrypted credential storage for agent-driven logins; credentials are filled directly into login forms via a "blind fill" pattern and are never sent to AI providers; user consent dialog before every use; TOTP 2FA support; domain-scoped access; append-only audit log
- Screenshot & Visual Analysis (Premium) — take a full-page screenshot and pass the image directly to the AI for visual layout analysis; useful when text extraction fails on heavy or canvas-rendered pages
- Obsidian Memory Hooks (Premium) — optional vault path for agent-written markdown notes, page captures, and research breadcrumbs
- Runtime Health Checks — startup warnings for MCP port conflicts, unreadable settings, and user-data write failures
- Reader Mode — extract article content into a clean, distraction-free view; toggle on and off from the address bar
- Focus Mode (
Ctrl+Shift+F) — hide all chrome, content fills the screen - Resizable Panels — drag the sidebar edge to resize; width persists across sessions
- Minimal Dark Theme — warm dark grays, restrained accent color, and no pure black/white
Positioning
Most browsers treat automation as secondary and assume a human is the primary actor. Vessel is the opposite: it is the browser for the agent, with a visible interface that keeps the human in the loop.
That means the product should optimize for:
- persistent browser state across tasks and sessions
- clear visibility into what the agent is doing right now
- lightweight human intervention instead of constant manual driving
- a browser runtime that can serve long-lived agent systems such as Hermes Agent or OpenClaw-style harnesses
Stack
| Layer | Technology |
|---|---|
| Engine | Chromium (Electron 40) |
| UI Framework | SolidJS |
| Language | TypeScript |
| Build | electron-vite + Vite |
| AI Control | External agent harnesses (Hermes Agent, OpenClaw, MCP clients) + built-in chat (Anthropic, OpenAI, Ollama, and any OAI-compatible endpoint) |
| Content Extraction | @mozilla/readability |
Architecture
Main Process Renderer (SolidJS)
├── TabManager (WebContentsView[]) ├── TabBar, AddressBar
├── AgentRuntime (session + supervision) ├── CommandBar (secondary surface)
├── MCP server for external agents ├── AI Sidebar (Supervisor/Bookmarks/Checkpoints/Chat/Automate)
├── AI providers (Anthropic + OAI-compat) ├── DevTools Panel (Console/Network/Activity)
├── Supervision, bookmarks, checkpoints ├── Agent Transcript Dock
└── IPC Handlers ◄──contextBridge──► ──► └── Signal stores (tabs, ai, ui)
└── IPC Handlers ◄──contextBridge──► Preload API
Each browser tab is a separate WebContentsView managed by the main process. The browser chrome (SolidJS) runs in its own view layered on top. All communication between renderer and main goes through typed IPC channels via contextBridge.
The sidebar Automate tab renders kit forms entirely in the renderer and passes the rendered prompt to the built-in agent via the same query() path used by the Chat tab — no additional IPC surface is needed.
Getting Started
The installer:
- clones or updates Vessel into
~/.local/share/vessel-browser - installs dependencies and builds the app
- creates a
vessel-browserlauncher in~/.local/bin - creates a
vessel-browser-launchhelper in~/.local/bin - creates a
vessel-browser-updatehelper in~/.local/bin - creates a
vessel-browser-statushelper in~/.local/bin - creates a desktop entry for Linux app launchers
- writes
~/.config/vessel/vessel-settings.jsonwith MCP port3100 - writes
~/.config/vessel/mcp-http-snippet.json - prints the exact HTTP MCP snippet to paste into your harness config
The packaged AppImage path:
- does not require a local Node/Electron toolchain
- uses the packaged Vessel app icon and metadata
- is the recommended path for early adopters who just want to run Vessel
After install:
vessel-browser
# Install dependencies
npm install
# If Electron download fails, use a mirror:
ELECTRON_MIRROR="https://npmmirror.com/mirrors/electron/" npm install
# Development (with HMR)
npm run dev
# Production build
npm run build
# Smoke-test the MVP release path
npm run smoke:test
# Package an unpacked Linux app
npm run dist:dir
# Package a Linux AppImage
npm run dist
Notes:
npm run devstill launches the stock Electron binary, so Linux may continue showing the default Electron gear icon in development- packaged builds created with
npm run dist/npm run dist:diruse the Vessel app icon - the tracked smoke test runs typecheck, build, and the Electron navigation regression harness
- for headless CI, run the smoke test under
xvfb-run -a npm run smoke:test
Setting up Vessel for Hermes Agent or OpenClaw
Vessel is designed to act as the browser runtime that your external agent harness drives.
- Launch Vessel
- Open Settings (
Ctrl+,) to confirm MCP status, copy the endpoint, or change the MCP port - Optional: set an Obsidian vault path or session preferences
- Start Hermes Agent or OpenClaw and configure it to connect to Vessel's MCP endpoint at
http://127.0.0.1:<mcpPort>/mcp - Use the Supervisor panel in Vessel's sidebar to pause the agent, change approval mode, review pending approvals, checkpoint, or restore the browser session while the harness runs
- Use the Bookmarks panel to organize saved pages into folders and expose those bookmarks back to the agent over MCP
Notes:
- Vessel exposes browser control to external agents through its local MCP server
- The default MCP port is
3100 - Hermes Agent and OpenClaw should treat Vessel as the persistent, human-visible browser rather than launching their own separate browser session
- Vessel supports a built-in Chat tab with configurable AI provider; open Settings (
Ctrl+,) and enable Chat Assistant to set a provider and model - Approval policy is controlled live from the sidebar Supervisor panel rather than a separate global settings screen
- Settings now show MCP runtime status, active endpoint, startup warnings, and allow changing the MCP port with an immediate server restart
- Agents can selectively disable ad blocking for a problematic tab, reload, retry the flow, and turn blocking back on later
- Agents can persist authenticated state with named sessions, for example
github-logged-in, and reload that state in later runs - The intended control plane is an external harness driving Vessel through MCP
- If you set an Obsidian vault path in Settings, harnesses can write markdown notes directly into that vault via Vessel memory MCP tools
Initial memory tools:
vessel_memory_note_createvessel_memory_appendvessel_memory_listvessel_memory_searchvessel_memory_page_capturevessel_memory_link_bookmark
Bookmark and folder tools exposed today include:
vessel_bookmark_listvessel_bookmark_searchvessel_bookmark_openvessel_bookmark_savevessel_bookmark_removevessel_create_foldervessel_folder_renamevessel_folder_remove
Page interaction and recovery tools exposed today include:
vessel_extract_contentvessel_read_pagevessel_scrollvessel_dismiss_popupvessel_set_ad_blockingvessel_wait_forvessel_screenshot(Premium) — capture the full page as an image for visual AI analysis
Page highlight tools:
vessel_highlight— visually mark text or an element on the page with a labeled, color-coded overlay; persists until clearedvessel_clear_highlights— remove all highlights from the current page
Workflow tracking tools:
vessel_flow_start— begin a named multi-step workflow and declare its steps upfront; progress appears in the sidebar throughout executionvessel_flow_advance— mark the current step complete and advance to the nextvessel_flow_status— check current workflow progressvessel_flow_end— clear the active workflow tracker
Data extraction tools (Premium):
vessel_extract_table— extract a page table as structured JSON rows with column headers
Named session tools exposed today include:
vessel_save_sessionvessel_load_sessionvessel_list_sessionsvessel_delete_session
Session files are sensitive because they may contain login cookies and tokens. Vessel stores them under the app user-data directory with restrictive file permissions.
Agent Credential Vault tools (Premium):
vessel_vault_status— check whether stored credentials exist for a domain (returns labels/usernames, never passwords)vessel_vault_login— fill a login form using stored credentials (blind fill — credentials go directly into the page, never into the AI conversation)vessel_vault_totp— generate and fill a TOTP 2FA code from a stored secret
Session performance tools (Premium):
vessel_metrics— show per-tool call counts, average durations, error rates, and total session stats
Vault security model:
- Credentials are encrypted at rest using AES-256-GCM with a key protected by the OS keychain (Electron safeStorage)
- Credential values are never sent to AI providers — they flow only through the main process to the content script
- Every credential use triggers a user consent dialog ("Allow Once" / "Allow for Session" / "Deny")
- All credential access is recorded in an append-only audit log
- Credentials are domain-scoped — they can only be used on matching domains
- Users manage credentials in Settings > Agent Credential Vault
Notable extraction modes include:
visible_only— only currently visible, in-viewport, unobstructed interactive elements plus active overlaysresults_only— likely primary search/result links onlyfull/summary/interactives_only/forms_only/text_only
The extraction output can distinguish:
- active blocking overlays
- dormant consent/modal UI present in the DOM but not active for the current session or region
Generic HTTP MCP config:
{
"mcpServers": {
"vessel": {
"type": "http",
"url": "http://127.0.0.1:3100/mcp"
}
}
}
Hermes Agent config.yaml MCP config:
mcp_servers:
vessel:
url: "http://127.0.0.1:3100/mcp"
timeout: 180
connect_timeout: 30
Configuration
The installer writes both snippets to:
~/.config/vessel/mcp-http-snippet.json~/.config/vessel/mcp-hermes-snippet.yaml
It also installs a helper command:
vessel-browser-mcp
Helper examples:
# Generic JSON snippet
vessel-browser-mcp
# Hermes-ready YAML snippet
vessel-browser-mcp --format hermes
# Raw MCP endpoint URL
vessel-browser-mcp --format url
Source install update helpers:
# Check whether a source-install update is available
vessel-browser-update --check
# Fetch, rebuild, and update the local source install
vessel-browser-update
Status helper:
# Human-readable local install + MCP status
vessel-browser-status
# Machine-readable status for harnesses
vessel-browser-status --json
Smart launch helper:
# Launch Vessel using the best available local install
vessel-browser-launch
# Show the chosen launch path without starting anything
vessel-browser-launch --dry-run
vessel-browser-launch prefers a healthy source install and falls back to the newest local AppImage when the source install is likely blocked by Electron sandbox permissions.
Keyboard Shortcuts
| Shortcut | Action |
|---|---|
Ctrl+L |
AI Command Bar |
Ctrl+Shift+L |
Toggle AI Sidebar |
Ctrl+Shift+F |
Toggle Focus Mode |
F12 |
Toggle Dev Tools Panel |
Ctrl+T |
New Tab |
Ctrl+W |
Close Tab |
Ctrl+, |
Settings |
Project Structure
src/
├── main/ # Electron main process
│ ├── ai/ # Agent tools, query flow, and AI provider implementations
│ ├── tabs/ # Tab + TabManager (WebContentsView)
│ ├── agent/ # Agent runtime, checkpoints, supervision, flow tracking
│ ├── content/ # Readability extraction, reader mode, screenshot
│ ├── config/ # Settings persistence
│ ├── ipc/ # IPC handler registry
│ ├── vault/ # Agent Credential Vault (encrypted storage, consent, audit)
│ ├── mcp/ # MCP server for external agent control
│ ├── devtools/ # CDP session management for Dev Tools panel
│ ├── highlights/ # Page highlight capture, injection, and persistence
│ ├── health/ # Runtime health monitoring (MCP, settings, ports)
│ ├── premium/ # Subscription management, feature gating, Stripe integration
│ ├── bookmarks/ # Bookmark and folder persistence
│ ├── history/ # Browse history
│ ├── memory/ # Obsidian vault hooks
│ ├── network/ # Ad blocking, URL safety, link validation, downloads
│ ├── sessions/ # Named session save/load/delete
│ ├── startup/ # App initialization, menu, shortcuts, renderer bootstrap
│ ├── telemetry/ # PostHog analytics (opt-in)
│ ├── tools/ # Tool definitions, input coercion, pruning
│ ├── window.ts # Window layout manager
│ └── index.ts # App entry point
├── preload/ # contextBridge scripts
│ ├── index.ts # Chrome UI preload
│ └── content-script.ts # Web page preload (readability)
├── renderer/ # SolidJS browser UI
│ └── src/
│ ├── components/
│ │ ├── chrome/ # TitleBar, TabBar, AddressBar, AgentTranscriptDock
│ │ ├── ai/ # CommandBar, Sidebar (Supervisor/Bookmarks/Checkpoints/Chat/Automate)
│ │ ├── devtools/ # DevTools panel (Console, Network, Activity)
│ │ └── shared/ # Settings panel
│ ├── stores/ # SolidJS signal stores (tabs, ai, ui, runtime, bookmarks, etc.)
│ ├── styles/ # Theme, global CSS
│ └── lib/ # Keybindings, markdown, automation kits registry
└── shared/ # Types + IPC channel constants
Design Principles
- Agent first — the browser is the agent's operating surface, not just a human tool with automation bolted on
- Human visible — the UI should make agent behavior easy to follow, audit, and steer
- Persistent by default — browser state should survive long-running workflows and repeated sessions
- Content first — chrome is 110px, everything else is your page
- Easy on the eyes — warm dark grays, muted text, no visual noise
- Linux-native — frameless window, system font fallbacks, XDG conventions
License
MIT
Developed by Tyler Williams in Portland, Oregon (2026)
Yorumlar (0)
Yorum birakmak icin giris yap.
Yorum birakSonuc bulunamadi
