Server data from the Official MCP Registry
MCP server that bridges local apps with Selenix for browser automation.
MCP server that bridges local apps with Selenix for browser automation.
Set these up before or after installing:
Environment variable: YOUR_API_KEY
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-markmircea-selenix-mcp-server": {
"env": {
"YOUR_API_KEY": "your-your-api-key-here"
},
"args": [
"-y",
"@selenix/mcp-server"
],
"command": "npx"
}
}
}This MCP server bridges Claude Desktop with Selenix for browser automation. It has legitimate developer tools functionality but lacks authentication between the MCP server and Selenix bridge, relying on filesystem-based token exchange. The server requires broad permissions including network access, file system access, and environment variables, which are appropriate for its purpose but create moderate security exposure. Supply chain analysis found 4 known vulnerabilities in dependencies (0 critical, 3 high severity). Package verification found 1 issue.
Scanned 3 files · 8 findings
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Be the first to review this server!