Auto Browser Sniffer (AB Sniffer) Challenge
Overview
The AB Sniffer challenge tests miners' ability to develop an SDK that can detect and correctly identify automation frameworks by name. The challenge evaluates how well the SDK can analyze automation behavior and identify unique characteristics or "leaks" from different automation tools interacting with a web page.
Miners must demonstrate precise detection capabilities across multiple automation frameworks while maintaining reliability across different execution modes (headless and headfull/headed-but-silent).
General Technical Requirements
- Development Language: Node.js SDK development
- Operating System: Ubuntu 24.04
- Environment: Docker container environment
- Architecture: amd64 (ARM64 at your own risk)
General Guidelines
- Detection Method: Analyze automation behavior, unique signatures, or behavioral patterns.
- Execution Modes: The SDK will be tested in both headless and headfull/headed-but-silent modes.
- Technical Setup: Headless mode must be enabled.
Plagiarism Check
We maintain strict originality standards:
- All submissions are compared against other miners' SDKs.
- 100% similarity = zero score.
- Similarity above 60% will result in rejection of the submission.
Submission Path
Dedicated Path: templates/commit/src/detections/
Place your detection module files in this directory before building your commit:
nodriver.jsseleniumbase.jsselenium-driverless.jspatchright.jspuppeteerextra.jszendriver.jsbotasaurus.jspydoll.js
Challenge Versions
Current:
- v5 (Active after Dec 02, 2025 10:00 UTC) - Modular detection with human-in-the-loop
Deprecated:
Resources & Guides
- Building a Submission Commit - General submission instructions
- ESLint Configuration Check - Pre-submission validation on Replit
- Challenge Repository
- Miner Repository
📑 References
- Docker - https://docs.docker.com