tor

tor (commonly Tor Browser / Tor project software) is used to route network traffic through the Tor anonymity network to reduce tracking and provide privacy against network-level observers.

Evaluated Apr 04, 2026 (19d ago)
Homepage ↗ Repo ↗ Security privacy anonymity networking tor
⚙ Agent Friendliness
0
/ 100
Can an agent use this?
🔒 Security
38
/ 100
Is it safe for agents?
⚡ Reliability
35
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
0
Documentation
0
Error Messages
0
Auth Simplicity
0
Rate Limits
0

🔒 Security

TLS Enforcement
70
Auth Strength
10
Scope Granularity
0
Dep. Hygiene
50
Secret Handling
70

Tor improves privacy by encrypting and relaying traffic through multiple hops, reducing exposure to network observers. However, the overall anonymity depends on threat model, endpoint security (browser hardening), and operational practices. Scores are constrained by missing repo-specific evidence (dependencies, update cadence, and exact configuration).

⚡ Reliability

Uptime/SLA
0
Version Stability
50
Breaking Changes
40
Error Recovery
50
AF Security Reliability

Best When

You need anonymity/privacy against local network observers and can tolerate Tor’s performance characteristics and usage policies.

Avoid When

You require strong performance/low latency, or you cannot follow Tor usage constraints (e.g., certain types of automated abuse, or environments that block or misuse Tor).

Use Cases

  • Browsing with improved privacy and resistance to network-based tracking
  • Circumventing censorship or surveillance where permitted
  • Protecting identity on untrusted networks (e.g., public Wi‑Fi)
  • Research and testing anonymity/network-privacy setups

Not For

  • High-throughput latency-sensitive production workloads
  • Guaranteeing anonymity against a global active adversary
  • Serving as a generic internet proxy without understanding Tor constraints and policies

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
No
SDK
No
Webhooks
No

Authentication

OAuth: No Scopes: No

No API authentication is implied by the package name alone; Tor typically relies on network routing and optional circuit controls rather than API keys/scopes.

Pricing

Free tier: No
Requires CC: No

Tor is generally provided as open-source software; no paywall pricing is implied by the package name.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • Likely no programmatic API surface (package appears to be a client/proxy application, not a tool library)
  • Tor traffic can fail due to network restrictions, bridge/captcha/circuit changes, and exit-node behavior
  • Automating requests through Tor may trigger blocks/captcha or violate usage policies

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for tor.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-04-04.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered