skyvern browser serve, Skyvern Cloud can control a Chrome browser running on your machine — using your existing cookies, sessions, extensions, and saved passwords.
Common use cases:
- Automate sites where you’re already authenticated (no need to re-login)
- Reach internal tools behind a VPN or firewall
- Use browser extensions you’ve already installed (ad blockers, auth tools, etc.)
- Keep all browser data on your own machine
Quick start
One command starts Chrome on your machine and creates a tunnel so Skyvern Cloud can connect:browser_address when running tasks.
The
--tunnel flag requires ngrok to be installed and authenticated. Run ngrok authtoken <your-token> once to set it up.Step-by-step (manual tunnel)
If you prefer to manage the tunnel yourself:Run a task on your local browser
Once the tunnel is running, pass the tunnel URL asbrowser_address:
How it works
skyvern browser serve:
- Launches Chrome with CDP (Chrome DevTools Protocol) enabled on an internal port
- Starts a proxy server on the exposed port (default
9222) that forwards CDP traffic to Chrome - Optionally creates a tunnel (
--tunnel) so Skyvern Cloud can reach it from the internet
CLI options
| Option | Default | Description |
|---|---|---|
--port | 9222 | Port for the proxy server. Chrome uses port + 1000 internally. |
--profile-dir | ~/.skyvern/chrome-profile | Chrome user data directory. Point this at an existing profile to reuse cookies and logins. |
--download-dir | ~/.skyvern/downloads/{browser_id} | Directory for browser downloads. |
--api-key | (none) | API key for authenticating incoming requests. See Security. |
--headless | false | Run Chrome in headless mode (no visible window). |
--chrome-path | (auto-detect) | Path to Chrome/Chromium executable. |
--tunnel | false | Automatically start an ngrok tunnel. Requires ngrok installed. |
--json | false | Output connection info as JSON (for scripting). Cannot combine with --tunnel. |
--api-key option can also be set via the SKYVERN_BROWSER_SERVE_API_KEY environment variable.
Examples
Security
API key authentication
Use your Skyvern API key (from Settings) with the--api-key flag to require authentication on every incoming request:
x-api-key header receive a 401 Unauthorized response. Skyvern Cloud automatically sends the correct API key when connecting.
Additional security measures
The built-in API key provides basic protection. For additional security such as IP allowlisting, mTLS, or VPN-based access, contact support@skyvern.com.When to use this vs other options
| Approach | When to use |
|---|---|
Connect to your local browser (skyvern browser serve) | You want Skyvern Cloud to use your local browser with your existing sessions |
| Browser Sessions | You want Skyvern Cloud to manage the browser entirely in the cloud |
| Browser Profiles | You want to save and reuse cookies/storage state across cloud sessions |
| CDP Connect (self-hosted) | You’re running Skyvern locally and want to connect to an existing Chrome instance |
Troubleshooting
ngrok not found
ngrok not found
Install ngrok from ngrok.com/download and authenticate it:
Chrome not found
Chrome not found
Use
--chrome-path to specify the path to your Chrome executable:Port already in use
Port already in use
Another process is using port 9222. Either stop that process or use a different port:
Tunnel connection drops
Tunnel connection drops
ngrok free tier tunnels have connection limits. For production use, consider an ngrok paid plan or contact support@skyvern.com for alternative tunnel options.
Next steps
Browser Sessions
Use cloud-managed browser sessions for multi-step tasks
Browser Profiles
Save and reuse authenticated browser state

