Server data from the Official MCP Registry
Bright Data's Web MCP server enabling AI agents to search, extract & navigate the web
Bright Data's Web MCP server enabling AI agents to search, extract & navigate the web
Set these up before or after installing:
Environment variable: API_TOKEN
Environment variable: WEB_UNLOCKER_ZONE
Environment variable: BROWSER_ZONE
Environment variable: PRO_MODE
Environment variable: GROUPS
Environment variable: TOOLS
Environment variable: POLLING_TIMEOUT
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-brightdata-brightdata-mcp": {
"env": {
"TOOLS": "your-tools-here",
"GROUPS": "your-groups-here",
"PRO_MODE": "your-pro-mode-here",
"API_TOKEN": "your-api-token-here",
"BROWSER_ZONE": "your-browser-zone-here",
"POLLING_TIMEOUT": "your-polling-timeout-here",
"WEB_UNLOCKER_ZONE": "your-web-unlocker-zone-here"
},
"args": [
"-y",
"@brightdata/mcp"
],
"command": "npx"
}
}
}This MCP server provides web scraping capabilities through Bright Data's API. While it includes proper authentication and reasonable permission scoping, there are concerning instances of hardcoded API credentials in test files and a known dangerous pattern of GitHub personal access tokens. The tool permissions align well with its web scraping purpose. Supply chain analysis found 6 known vulnerabilities in dependencies (0 critical, 6 high severity). Package verification found 1 issue.
Scanned 3 files · 11 findings
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Be the first to review this server!