Connect your IDE to the Web's Neural Network
VibeLens bridges your Chrome browser, a local MCP Server, and AI assistants like Claude Code. Record traffic visually, analyze patterns with AI, generate crawler scripts with VibeCrawl Auto-RAG, and run 150+ HexStrike security tools autonomously.
The VibeLens Ecosystem
Chrome Extension
The Observer
Silently monitors your browser traffic. Built with multi-domain tracking, capturing SSO redirect chains, cookies, headers, and full payload bodies seamlessly.
MCP Protocol Server
The Brain
A local stdio bridge server connecting directly to Cursor or Claude Code. It exposes powerful tools enabling AI to analyze APIs and autonomously execute HTTP requests.
Claude Code Ready
Native integration with Claude CLI and Cursor MCP Configuration.
Data Masking
Automatic redaction of PII, passwords, and tokens before AI sees them.
Zero-Config AI Actions
"Claude, analyze the login flow I just did and write a python script for it."
HexStrike Engine
Native integration with 156+ security tools (Nmap, SQLMap, Nuclei, CTFs).
VibeCrawl Auto-RAG
Auto-pulls Scrapling Docs & generates 100% accurate Scrapling logic from traffic.
HAR Import
Parse Chrome HAR files into AI Digests outlining auth flows and APIs.
Dashboard UI
Web-based request manager with AI filtering.
The Typical Workflow
Record Network
Open the Chrome Extension and click "Start Recording". Browse the target website normally.
Bridge to Local
The FastAPI server receives the network data while the MCP stdio server exposes it as tools to your IDE.
AI Takes Control
Chat with your AI in Cursor/Claude Code. Watch it autonomously replicate HTTP requests.
Use Case: Auto-Login Script Generation
Instead of manually finding execution tokens and tracing 302 redirects in DevTools, VibeLens allows an AI agent to reverse-engineer an entire CAS (Central Authentication Service) SSO Login flow in seconds.
The Prompt
"I just recorded myself logging into my university LMS. Please use the MCP tools to read the captured requests, find the authentication cookies, trace the SSO login API endpoint, and write a Python script using `httpx` to automatically log in."
What the AI Does Under the Hood
-
Calls
get_auth_info()to identify the multi-domain track:
`lms.hcmut.edu.vn` → `sso.hcmut.edu.vn`. -
Calls
get_request_detail(23)and parses the HTML to extract hidden inputs like `lt` (Login Ticket) and `execution` fields. - Maps out the POST request for user credentials.
- Outputs a flawless `httpx` Python script integrating `follow_redirects=True`.
The Resulting Python Output
Setup & Documentation
Start your engine in seconds.
Launch the unified infrastructure and connect your favorite MCP-compatible AI IDE.
1. Start API Bridge
The listener for your Chrome Extension.
2. Configure IDE
Just point Cursor or Claude Code to the MCP stdio python server.
# 1. Install
pip install -e .
# 2. Start FastApi Bridge
python -m vibeengine.mcp.server
# 3. Add MCP to Claude Code
claude mcp add vibelens -- /absolute/path/to/python -m vibeengine.mcp.mcp_server
Installing the Chrome Extension
- Open Google Chrome and navigate to
chrome://extensions/ - Toggle Developer Mode on in the top right corner.
- Click Load unpacked and select the
vibelens/extension/folder. - Pin the VibeLens icon to your toolbar for easy access. Click "Start Recording" to begin!
Cursor / RooCode Settings
To connect the MCP Server in VS Code/Cursor:
- Open IDE Settings > MCP Servers > Add New
- Name:
vibelens - Type:
command - Command:
/absolute/path/to/your/venv/bin/python - Args:
["-m", "vibeengine.mcp.mcp_server"]