Experiment Preferences jobs-apply

Connecting to the user's real Chrome via CDP will be more resistant to bot detection than Playwright's bundled Chromium with stealth scripts

browseranti-detectioncareer
Hypothesis

Connecting to the user's real Chrome via CDP will be more resistant to bot detection than Playwright's bundled Chromium with stealth scripts

Result: confirmed
Key Findings

CDP mode disables ALL stealth scripts, relying entirely on real Chrome session. 22-38s click gaps were pure LLM inference, not humanization. Real Chrome with a user profile + cookies + extensions is inherently undetectable because it IS a real browser. The 275-line stealth module was unnecessary.

Changelog

DateSummary
2026-04-07Created during temporal gap audit
2026-03-22Original audit (JOBHUNTR_AUDIT_2026-03-22.md)

Hypothesis

Real Chrome via CDP is more resistant to bot detection than Playwright Chromium with stealth script injection.

Method

Produced JOBHUNTR_AUDIT_2026-03-22.md (274 lines) comparing the two strategies. In CDP mode: connects to user’s real Chrome on port 9222, uses their profile/cookies/extensions, zero stealth scripts. In bundled mode: Playwright Chromium with 12 stealth injections (navigator.webdriver, fake window.chrome, plugin spoofing, etc.).

Results

CDP mode confirmed superior. The real browser has no detectable artifacts because there are no artifacts to detect. The 12 stealth scripts in bundled mode each add a potential detection surface : the scripts themselves can be detected. Click timing analysis showed 22-38s gaps between actions were pure LLM inference time, not humanization : revealing that perceived “slowness” was the AI thinking, not intentional delays.