{"id":"zhizhuodemao-js-reverse-mcp","name":"js-reverse-mcp","af_score":58.8,"security_score":34.2,"reliability_score":27.5,"what_it_does":"js-reverse-mcp is an MCP server (TypeScript) that drives a Chrome/Chromium instance to help AI coding assistants inspect and debug JavaScript in web pages. It supports page navigation/context selection, script listing and source retrieval, breakpoints/stepping, function tracing, runtime evaluation at breakpoints, and network/WebSocket inspection. It also supports pre-load script injection. The project documentation highlights use of a stealth/anti-detection browser engine (Patchright) with many stealth settings.","best_when":"You control the browsing targets (or have authorization), need JS source/function discovery and interactive debugging capabilities from an MCP-capable agent, and can tolerate the operational complexity of running Chrome/DevTools tooling.","avoid_when":"You need audited security controls, deterministic behavior, or guaranteed idempotency; or you are dealing with sensitive data where browser content exposure is unacceptable.","last_evaluated":"2026-03-30T13:27:25.203719+00:00","has_mcp":true,"has_api":false,"auth_methods":["None specified (runs locally via npx/node; communicates with MCP client over the MCP transport)."],"has_free_tier":false,"known_gotchas":["Operations are stateful and depend on selected page/frame/paused state; agents must maintain context (page/frame IDs, breakpoint IDs, pause/resume sequencing).","Stealth/anti-detection configuration may affect site behavior and can cause inconsistencies across targets.","Network/WebSocket inspection may be timing-sensitive (messages and requests depend on when breakpoints are set).","Running locally via npx/node requires the MCP host to have Node.js and access to a compatible Chrome/Chromium runtime."],"error_quality":0.0}