In the latest 2026.3.23.1 release, OpenClaw has undergone a significant overhaul of its browser automation tools.
According to official documentation and recent releases from the Chrome team, OpenClaw has officially transitioned from the unstable “Extension Relay” mode to a native connection scheme based on Chrome DevTools MCP (Model Context Protocol). This means AI can now take over your browser in a more secure, native, and efficient manner.
Core Evolution: Why No More Extensions?
Before version 2026.3.23.1, OpenClaw primarily relied on a manually installed Chrome extension to bridge the connection. This approach suffered from limited permissions and unstable session synchronization.
The new version introduces two core Profile modes:
openclawMode: A fully isolated, managed browser that works out of the box with no configuration required (features an orange theme).userMode (Upgraded from the oldchromemode): Directly attaches to your active Chrome window via Chrome DevTools MCP, achieving true “zero-extension” takeover.
Legacy Tutorial: Chrome Extension Relay
If you are still using an older version, the connection logic depends on a browser extension:
- Install Extension: Go to
chrome://extensions/, enable Developer Mode, and manually load theopenclaw-connectorfolder. - ID Configuration: Enter the unique ID generated by the extension into your
~/.openclaw/openclaw.json(or the older YAML config). - Manual Authorization: Before each task, you must click the extension icon in the browser and manually allow OpenClaw to connect to the current tab.
New Version Tutorial: DevTools MCP Remote Debugging (Recommended)
In 2026.3.23.1, connecting to your native browser (Profile: user) no longer requires an extension. Instead, it utilizes the native remote debugging capabilities built into Chrome 144+.
Step 1: Enable Remote Debugging in Chrome
No more complex command-line arguments. You can now enable this within Chrome’s settings:
- Enter
chrome://inspect/#remote-debuggingin the Chrome address bar. - Check “Enable remote debugging”.
- Follow the prompts to allow incoming debugging connections.
Step 2: Configure OpenClaw to Use the user Profile
OpenClaw configuration is now unified in ~/.openclaw/openclaw.json. To enable native takeover, ensure your configuration looks like this:
| |
Step 3: Authorize the Connection
The first time you run openclaw tool run browser, a native authorization dialog will pop up at the top of Chrome.
- Click “Allow”.
- Chrome will then display a banner stating “Chrome is being controlled by automated test software,” indicating the AI has successfully taken over.
Key Technical Comparison
| Feature | Old (Extension) | New (DevTools MCP) |
|---|---|---|
| Connection Protocol | Extension API Forwarding | Native CDP / MCP Protocol |
| Authentication | Extension ID Verification | System-level Chrome Popup Authorization |
| Session Sharing | Requires extension intervention | Native sharing of existing sessions |
| Security | Extension might have injection risks | Based on Chrome’s built-in security sandbox |
| System Requirements | Any Chrome version | Chrome M144 or higher |
Upgrade Recommendations and Notes
- Version Requirements: Native MCP mode requires Chrome M144 (Beta/Canary) or higher. If you are using a stable version of Chrome with a lower version number, it is recommended to continue using the
openclawmanaged mode. - Config Path: OpenClaw configuration has moved from
config.yamlto the more standardized~/.openclaw/openclaw.json. - Privacy Reminder: When using
usermode, the AI can access all pages where you are currently logged in (e.g., GitHub, Gmail). Ensure you trust the agent before performing automated tasks.