
Research
/Security News
CanisterWorm: npm Publisher Compromise Deploys Backdoor Across 29+ Packages
The worm-enabled campaign hit @emilgroup and @teale.io, then used an ICP canister to deliver follow-on payloads.
@different-ai/opencode-browser
Advanced tools
Browser automation MCP server for OpenCode. Control your real Chrome browser with existing logins and cookies.
Browser automation MCP server for OpenCode.
Control your real Chrome browser with existing logins, cookies, and bookmarks. No DevTools Protocol, no security prompts.
Chrome 136+ blocks --remote-debugging-port on your default profile for security reasons. DevTools-based automation (like Playwright) triggers a security prompt every time.
OpenCode Browser uses a simple WebSocket connection between an MCP server and a Chrome extension. Your automation works with your existing browser session - no prompts, no separate profiles.
npx @different-ai/opencode-browser install
The installer will:
~/.opencode-browser/extension/opencode.json with MCP server configAdd to your opencode.json:
{
"mcp": {
"browser": {
"type": "local",
"command": ["bunx", "@different-ai/opencode-browser", "serve"]
}
}
}
Then load the extension in Chrome:
chrome://extensions~/.opencode-browser/extension/| Tool | Description |
|---|---|
browser_status | Check if browser extension is connected |
browser_navigate | Navigate to a URL |
browser_click | Click an element by CSS selector |
browser_type | Type text into an input field |
browser_screenshot | Capture the page (returns base64, optionally saves to file) |
browser_snapshot | Get accessibility tree with selectors + all page links |
browser_get_tabs | List all open tabs |
browser_scroll | Scroll page or element into view |
browser_wait | Wait for a duration |
browser_execute | Run JavaScript in page context |
The browser_screenshot tool returns base64 image data by default, allowing AI to view images directly:
// Returns base64 image (AI can view it)
browser_screenshot()
// Save to current working directory
browser_screenshot({ save: true })
// Save to specific path
browser_screenshot({ path: "my-screenshot.png" })
OpenCode <──STDIO──> MCP Server <──WebSocket:19222──> Chrome Extension
│ │
└── @modelcontextprotocol/sdk └── chrome.tabs, chrome.scripting
Two components:
Benefits of MCP architecture:
v3.0 migrates from plugin to MCP architecture:
npx @different-ai/opencode-browser installopencode.json:- "plugin": ["@different-ai/opencode-browser"]
+ "mcp": {
+ "browser": {
+ "type": "local",
+ "command": ["bunx", "@different-ai/opencode-browser", "serve"]
+ }
+ }
"Chrome extension not connected"
"Failed to start WebSocket server"
lsof -i :19222 to check what's using it"browser_execute fails on some sites"
browser_snapshot to get page data insteadnpx @different-ai/opencode-browser uninstall
Then remove the extension from Chrome and delete ~/.opencode-browser/ if desired.
MIT
Inspired by Claude in Chrome by Anthropic.
FAQs
Browser automation plugin for OpenCode (native messaging + per-tab ownership).
The npm package @different-ai/opencode-browser receives a total of 229 weekly downloads. As such, @different-ai/opencode-browser popularity was classified as not popular.
We found that @different-ai/opencode-browser demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
/Security News
The worm-enabled campaign hit @emilgroup and @teale.io, then used an ICP canister to deliver follow-on payloads.

Research
/Security News
Attackers compromised Trivy GitHub Actions by force-updating tags to deliver malware, exposing CI/CD secrets across affected pipelines.

Security News
ENISA’s new package manager advisory outlines the dependency security practices companies will need to demonstrate as the EU’s Cyber Resilience Act begins enforcing software supply chain requirements.