VibeLens v2.0 is now live

Connect your IDE to the Web's Neural Network

VibeLens bridges your Chrome browser, a local MCP Server, and AI assistants like Claude Code. Record traffic visually, analyze patterns with AI, generate crawler scripts with VibeCrawl Auto-RAG, and run 150+ HexStrike security tools autonomously.

The VibeLens Ecosystem

Chrome Extension
The Observer

Silently monitors your browser traffic. Built with multi-domain tracking, capturing SSO redirect chains, cookies, headers, and full payload bodies seamlessly.

Captured: POST /cas/login
cookies: [ "JSESSIONID", "MoodleSession" ]
body: { "username": "student123", "lt": "LT-..." }

MCP Protocol Server
The Brain

A local stdio bridge server connecting directly to Cursor or Claude Code. It exposes powerful tools enabling AI to analyze APIs and autonomously execute HTTP requests.

get_captured_requests get_auth_info hexstrike_smart_scan generate_api_code import_har generate_scrapling_spider hexstrike_tool

Claude Code Ready

Native integration with Claude CLI and Cursor MCP Configuration.

Data Masking

Automatic redaction of PII, passwords, and tokens before AI sees them.

Zero-Config AI Actions

"Claude, analyze the login flow I just did and write a python script for it."

HexStrike Engine

Native integration with 156+ security tools (Nmap, SQLMap, Nuclei, CTFs).

VibeCrawl Auto-RAG

Auto-pulls Scrapling Docs & generates 100% accurate Scrapling logic from traffic.

HAR Import

Parse Chrome HAR files into AI Digests outlining auth flows and APIs.

Dashboard UI

Web-based request manager with AI filtering.

The Typical Workflow

1

Record Network

Open the Chrome Extension and click "Start Recording". Browse the target website normally.

2

Bridge to Local

The FastAPI server receives the network data while the MCP stdio server exposes it as tools to your IDE.

3

AI Takes Control

Chat with your AI in Cursor/Claude Code. Watch it autonomously replicate HTTP requests.

Use Case: Auto-Login Script Generation

Instead of manually finding execution tokens and tracing 302 redirects in DevTools, VibeLens allows an AI agent to reverse-engineer an entire CAS (Central Authentication Service) SSO Login flow in seconds.

The Prompt

"I just recorded myself logging into my university LMS. Please use the MCP tools to read the captured requests, find the authentication cookies, trace the SSO login API endpoint, and write a Python script using `httpx` to automatically log in."

What the AI Does Under the Hood

  • Calls get_auth_info() to identify the multi-domain track:
    `lms.hcmut.edu.vn` → `sso.hcmut.edu.vn`.
  • Calls get_request_detail(23) and parses the HTML to extract hidden inputs like `lt` (Login Ticket) and `execution` fields.
  • Maps out the POST request for user credentials.
  • Outputs a flawless `httpx` Python script integrating `follow_redirects=True`.

The Resulting Python Output

import httpx, re

def login_lms(username, password):
    client = httpx.Client(follow_redirects=True)
    
    # 1. Reach SSO Login Page
    r1 = client.get("https://lms.hcmut.edu.vn/login/index.php?authCAS=CAS")
    
    # 2. Extract hidden CAS Fields using Regex
    lt = re.search(r'name="lt"\s+value="([^"]+)"', r1.text).group(1)
    execution = re.search(r'name="execution"\s+value="([^"]+)"', r1.text).group(1)
    
    # 3. POST Credentials
    r2 = client.post(
        "https://sso.hcmut.edu.vn/cas/login...",
        data={
            "username": username,
            "password": password,
            "lt": lt,
            "execution": execution,
            "_eventId": "submit"
        }
    )
    
    # 4. Check status & Return Cookies!
    if "sso.hcmut.edu.vn/cas/login" in str(r2.url):
        raise Exception("❌ Wrong credentials!")
        
    return client.cookies.get("MoodleSession")
What took 2 hours of manual reverse engineering now takes 30 seconds.

Setup & Documentation

Start your engine in seconds.

Launch the unified infrastructure and connect your favorite MCP-compatible AI IDE.

1. Start API Bridge

The listener for your Chrome Extension.

2. Configure IDE

Just point Cursor or Claude Code to the MCP stdio python server.

# 1. Install

pip install -e .


# 2. Start FastApi Bridge

python -m vibeengine.mcp.server


# 3. Add MCP to Claude Code

claude mcp add vibelens -- /absolute/path/to/python -m vibeengine.mcp.mcp_server

Installing the Chrome Extension

  • Open Google Chrome and navigate to chrome://extensions/
  • Toggle Developer Mode on in the top right corner.
  • Click Load unpacked and select the vibelens/extension/ folder.
  • Pin the VibeLens icon to your toolbar for easy access. Click "Start Recording" to begin!

Cursor / RooCode Settings

To connect the MCP Server in VS Code/Cursor:

  • Open IDE Settings > MCP Servers > Add New
  • Name: vibelens
  • Type: command
  • Command: /absolute/path/to/your/venv/bin/python
  • Args: ["-m", "vibeengine.mcp.mcp_server"]