Browser-grade fingerprint
The TLS handshake, HTTP/2 frames, header ordering, JA3/JA4 — indistinguishable from a real Chrome session because it uses the same networking stack.
Modern sites fingerprint every request your agent makes and quietly serve it a lesser web — 403s, CAPTCHAs, degraded content. Wick runs locally, speaks the same protocol real browsers do, and exits from your own IP. The page your agent fetches is the same page you see.
Anti-bot systems fingerprint at the TLS layer, HTTP layer, JS layer — dozens of signals in the first hundred milliseconds. Your agent's requests don't match any real browser's, so the site serves a CAPTCHA, a 403, or a lobotomized version of the page. You built the agent to read the internet; it is reading a suggestion of it.
Wick sits on your machine, routes the fetch through the same stack real Chrome uses, and exits from your own residential IP with your own cookies. To the site, there is no agent. There is only you, browsing. Every bit the site would show a human, it shows your agent.
Left: what your agent sees without Wick. Right: what it sees with. Hover the dossier to toggle the reveal sweep.
Everything required to put a real browser's access behind your agent's fetch call — and nothing that phones home.
The TLS handshake, HTTP/2 frames, header ordering, JA3/JA4 — indistinguishable from a real Chrome session because it uses the same networking stack.
No cloud proxy, no third-party servers, no middleman. The binary lives on your laptop. Requests and responses never leave your network.
Raw HTML wastes tokens. Wick strips chrome, ads, and scaffolding and returns structured markdown your model can actually reason over.
No pooled residential exit networks. Requests carry your signals because you are the one making them — through the agent you wrote.
Works out of the box with Claude Code, Cursor, Windsurf, and any MCP-compatible client. One install and your agent gains wick_fetch.
wick_search issues real browser queries and returns clean result sets. Pair with wick_fetch for end-to-end research.
Your MCP client invokes wick_fetch(url) — no SDK, no API key.
Wick's daemon accepts the call on 127.0.0.1. Nothing leaves the machine yet.
The request goes out through Chromium's real network layer — TLS, HTTP/2, everything.
Response is extracted, boilerplate stripped, handed back as markdown with metadata.
| Wick FREE |
Wick PRO |
Firecrawl | Bright Data | Browserbase | Playwright | |
|---|---|---|---|---|---|---|
| Anti-bot bypass | ● | ●● | ○ | part | ○ | ○ |
| JavaScript rendering | ○ | ● | ● | ● | ● | ● |
| Runs locally | ● | ● | ○ | ○ | ○ | ● |
| Your residential IP | ● | ● | ○ | pool | ○ | ● |
| Markdown output | ● | ● | ● | ● | ○ | ○ |
| No cloud round-trip | ● | ● | ○ | ○ | ○ | ● |
| Paid starting at | $0 | custom | $19/mo | metered | $150/mo | $0 |
Wick is unified open source. TLS fingerprinting, JS rendering, stealth patches, auto-CAPTCHA, residential tunneling — all free, all in one binary.
brew tap wickproject/wick && brew install wick
Detects Claude Code, Cursor, Windsurf, and other MCP clients.
wick setup
Your agent now has wick_fetch and wick_search. Search the web, read any page — clean markdown returned.
curl -fsSL https://wickproject.github.io/wick/apt/install.sh | bash
Or add the APT repo manually:
echo "deb [trusted=yes] https://wickproject.github.io/wick/apt stable main" \ | sudo tee /etc/apt/sources.list.d/wick.list sudo apt update && sudo apt install wick
wick setup
Agent gains wick_fetch and wick_search.
Works anywhere Node.js does.
npm install -g wick-mcp
wick setup
Agent gains wick_fetch and wick_search.
Fully open source (MIT). Every feature — free. Contribute, fork, build on it.