docs: add browser login + X posting guidance
This commit is contained in:
50
docs/tools/browser-login.md
Normal file
50
docs/tools/browser-login.md
Normal file
@@ -0,0 +1,50 @@
|
||||
---
|
||||
summary: "Manual logins for browser automation + X/Twitter posting"
|
||||
read_when:
|
||||
- You need to log into sites for browser automation
|
||||
- You want to post updates to X/Twitter
|
||||
---
|
||||
|
||||
# Browser login + X/Twitter posting
|
||||
|
||||
## Manual login (recommended)
|
||||
|
||||
When a site requires login, **sign in manually** in the **host** browser profile (the clawd browser).
|
||||
|
||||
Do **not** give the model your credentials. Automated logins often trigger anti‑bot defenses and can lock the account.
|
||||
|
||||
## X/Twitter: recommended flow
|
||||
|
||||
- **Read/search/threads:** use the **bird** CLI skill (no browser, stable).
|
||||
- Repo: https://github.com/steipete/bird
|
||||
- **Post updates:** use the **host** browser (manual login).
|
||||
|
||||
## Sandboxing + host browser access
|
||||
|
||||
Sandboxed browser sessions are **more likely** to trigger bot detection. For X/Twitter (and other strict sites), prefer the **host** browser.
|
||||
|
||||
If the agent is sandboxed, the browser tool defaults to the sandbox. To allow host control:
|
||||
|
||||
```json5
|
||||
{
|
||||
agents: {
|
||||
defaults: {
|
||||
sandbox: {
|
||||
mode: "non-main",
|
||||
browser: {
|
||||
allowHostControl: true
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
Then target the host browser:
|
||||
|
||||
```bash
|
||||
clawdbot browser open https://x.com --browser-profile clawd --target host
|
||||
```
|
||||
|
||||
Or disable sandboxing for the agent that posts updates.
|
||||
|
||||
@@ -221,6 +221,7 @@ Notes:
|
||||
## Security & privacy
|
||||
|
||||
- The clawd browser profile may contain logged-in sessions; treat it as sensitive.
|
||||
- For logins and anti-bot notes (X/Twitter, etc.), see [Browser login + X/Twitter posting](/tools/browser-login).
|
||||
- Keep control URLs loopback-only unless you intentionally expose the server.
|
||||
- Remote CDP endpoints are powerful; tunnel and protect them.
|
||||
|
||||
|
||||
Reference in New Issue
Block a user