Skip to content

Commit bfbdada

Browse files
OrKoNsebastianbenz
andauthored
docs: document mcp client sandboxing (#65)
Co-authored-by: Sebastian Benz <[email protected]>
1 parent 1e8662f commit bfbdada

File tree

1 file changed

+11
-0
lines changed

1 file changed

+11
-0
lines changed

README.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -204,3 +204,14 @@ The user data directory is not cleared between runs and shared across
204204
all instances of `chrome-devtools-mcp`. Set the `isolated` option to `true`
205205
to use a temporary user data dir instead which will be cleared automatically after
206206
the browser is closed.
207+
208+
## Known limitations
209+
210+
### Operating system sandboxes
211+
212+
Some MCP clients allow sandboxing the MCP server using macOS Seatbelt or Linux
213+
containers. If sandboxes are enabled, `chrome-devtools-mcp` is not able to start
214+
Chrome that requires permissions to create its own sandboxes. As a workaround,
215+
either disable sandboxing for `chrome-devtools-mcp` in your MCP client or use
216+
`--connect-url` to connect to a Chrome instance that you start manually outside
217+
of the MCP client sandbox.

0 commit comments

Comments
 (0)