SDK Documentation

Unbrowse uses the Model Context Protocol (MCP) to integrate with AI assistants. This page covers advanced configuration and usage.

What is MCP?

The Model Context Protocol is an open standard that allows AI assistants to interact with external tools and services. Instead of writing custom integrations for each AI platform, Unbrowse provides a single MCP server that works across:

  • Claude Desktop

  • Continue.dev

  • Cline

  • Any MCP-compatible AI tool

Installation

Automated (Smithery)

The easiest way to install:

npx @smithery/cli install @lekt9/unbrowse-mcp --client claude

This automatically configures your Claude Desktop with the Unbrowse MCP server.

Manual Configuration

Claude Desktop

Location: ~/Library/Application Support/Claude/claude_desktop_config.json (macOS)

Continue.dev

Location: ~/.continue/config.json

Cline (VS Code Extension)

Add to Cline's MCP settings:

Environment Variables

Configure the MCP server with these environment variables:

Available Tools

The Unbrowse MCP server exposes these tools to AI assistants:

Search for abilities by natural language query.

Input Schema:

Output:

Example:

unbrowse_execute

Execute a specific ability with parameters.

Input Schema:

Output:

Example:

unbrowse_list_categories

List all available ability categories.

Input: None

Output:

Advanced Usage

Chaining Multiple Abilities

AI assistants can automatically chain Unbrowse abilities:

Error Handling

The MCP server returns detailed error information:

Caching

The MCP server automatically caches ability search results for 5 minutes to reduce costs and latency.

Cache behavior:

  • Search queries are cached by query string

  • Ability definitions cached by ID

  • Cache invalidated on any execution error

  • Can be disabled with UNBROWSE_DISABLE_CACHE=true

Monitoring Usage

Track your Unbrowse usage in the dashboard:

agent.unbrowse.ai/dashboardarrow-up-right

Metrics available:

  • Total searches performed

  • Total abilities executed

  • Cost breakdown by ability

  • Success/failure rates

  • Most-used abilities

Security

API Key Protection

Never commit API keys to version control.

Best practices:

  • Use environment variables

  • Store in OS-specific secure storage (Keychain, etc.)

  • Rotate keys regularly

  • Use separate keys for dev/prod

Request Signing

All MCP requests are signed with your API key. The server validates:

  • API key authenticity

  • Request timestamp (prevents replay attacks)

  • Request integrity (prevents tampering)

Debugging

Enable debug logging:

This logs:

  • All search queries

  • Ability executions

  • API responses

  • Error details

  • Performance metrics

Debug output:

Performance

Typical latencies:

  • Ability search: 20-50ms (cached: <5ms)

  • Ability execution: 200-500ms

  • Total workflow: <1 second

Optimization tips:

  • Use specific queries ("LinkedIn post with image" vs "social media")

  • Reuse ability IDs instead of searching repeatedly

  • Execute abilities in parallel when possible

Troubleshooting

"MCP server not found"

Solution:

"Invalid API key"

Solution:

"Rate limit exceeded"

Solution:

"Ability execution failed"

Solutions:

  • Check ability parameters match requirements

  • Verify you have necessary credentials/subscriptions

  • Try a different ability variant

  • Report persistent failures to support

Next Steps

  • Integration Examples - Detailed use cases

  • API Reference - REST API docs (for custom integrations)

  • Authentication - Auth methods and security


Questions? Join our Discordarrow-up-right or visit Smitheryarrow-up-right

Last updated