Seleniumbase gets detected by imperva #3106
Replies: 4 comments 7 replies
-
Follow the example from SeleniumBase/examples/raw_antibot_login.py, which demonstrates how to avoid detection on sites using real-time bot-scanning software (such as Brotector, Imperva, and DataDome): from seleniumbase import SB
with SB(uc=True, test=True) as sb:
url = "https://seleniumbase.io/antibot/login"
sb.uc_open_with_disconnect(url, 2.15)
sb.uc_gui_write("\t" + "demo_user")
sb.uc_gui_write("\t" + "secret_pass")
sb.uc_gui_press_keys("\t" + " ") # For Single-char keys
sb.sleep(1.5)
sb.uc_gui_press_keys(["\t", "ENTER"]) # Multi-char keys
sb.reconnect(1.8)
sb.assert_text("Welcome!", "h1")
sb.set_messenger_theme(location="bottom_center")
sb.post_message("SeleniumBase wasn't detected!") There, Here's another example, SeleniumBase/examples/raw_brotector_captcha.py: from seleniumbase import SB
with SB(uc=True, test=True) as sb:
url = "https://seleniumbase.io/apps/brotector"
sb.uc_open_with_disconnect(url, 2.2)
sb.uc_gui_press_key("\t")
sb.uc_gui_press_key(" ")
sb.reconnect(2.2) Here's a slightly longer, more fun example: SeleniumBase/examples/raw_hobbit.py: from seleniumbase import SB
with SB(uc=True, test=True) as sb:
url = "https://seleniumbase.io/hobbit/login"
sb.uc_open_with_disconnect(url, 2.2)
sb.uc_gui_press_keys("\t ")
sb.reconnect(1.5)
sb.assert_text("Welcome to Middle Earth!", "h1")
sb.set_messenger_theme(location="bottom_center")
sb.post_message("SeleniumBase wasn't detected!")
sb.click("img")
sb.sleep(5.888) # Cool animation happening now! I'm currently working on a way to use selectors while disconnected so that tabbing through elements isn't needed anymore to avoid detection. |
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
Ok i have Google Chrome: Python: selenium 4.24.0 And MacOS 14.6.1 (23G93) Do you have any more ideas ? |
Beta Was this translation helpful? Give feedback.
-
Same issue ... |
Beta Was this translation helpful? Give feedback.
-
Hey since today imperva seems to detect seleniumbase in uc mode.
the site im crawling is https://join.pokemon.com
and since today a new script gets injected, which removes half os the site. But only when using Brave or when the browser is started using a script (both webbrowser or seleniumbase)
Does someone have any ideas ?
Blocking this script does not work
Beta Was this translation helpful? Give feedback.
All reactions