fake-app-scraper / README.md
sylvain471's picture
Update README.md
fe5c202 verified
metadata
title: Fake App Scraper
emoji: πŸ“ˆ
colorFrom: green
colorTo: pink
sdk: docker
app_file: app.py
pinned: false
license: mit
short_description: uses playwright to scrape a fake app hosted on vercel
tags:
  - mcp-server-track

EDIT: post deadline modification

following a discussion with abubakar on discord I added a feature that check whether a token is given by a user (UI version) or via request header (mcp version). This allows to experiment in the UI whereas the pre-deadline version only allowed for mcp use as was describe in the pre-deadline README. Also README was edited after deadline to fix the tag->tags issue.

The last commit before deadline was a199b381ac05f2e732e3de120e24711567949a3a

Fake app scraper

link to test video with Claude https://youtu.be/WhLegRIdpRo

This app uses Playwright to log in and scrape the content of the dashboard of the fake app fake-app-omega.vercel.app.

The url, username and password to log in to the fake-app dashboard are embedded in the token provided by the user for UI use or passed to the mcp-server via a token in the request header.

You can test the mcp-server tools in Claude desktop using the following mcp-server config

Claude config

 {
                "mcpServers": {
                    "gradio": {
                        "command": "npx",
                        "args": [
                            "mcp-remote",
                            "https://agents-mcp-hackathon-fake-app-scraper.hf.space/gradio_api/mcp/sse",
                            "--header",
                            "token:aHR0cHM6Ly9mYWtlLWFwcC1vbWVnYS52ZXJjZWwuYXBwL2xvZ2luPHNlcD5ncmFkaW88c2VwPm1jcA==",
                        ],
                    }
                }
            }

Fake App

login dashboard