URL proxy service on Cloudflare Workers. Masquerades as Google Bot to bypass blockers and renders pages as readable text.
- Bot Masquerading: Uses Google Bot user-agent to bypass simple blockers
- Browser Fallback: Auto-falls back to Cloudflare Browser Rendering (puppeteer) when blocked (403) or redirected to paywall/cookie pages
- Content Stripping: Removes tracking scripts, analytics, cookie banners
- Reader Styles: Injects clean reading styles
- Caching: Configurable response caching
GET /proxy?url=<encoded_url>
| Param | Description |
|---|---|
url |
URL to fetch (required, URL-encoded) |
cache_ttl |
Cache duration in seconds (default: 3600) |
nocache=1 |
Bypass cache, fetch fresh |
purge=1 |
Delete cached entry and refetch |
header_* |
Custom headers (e.g. header_Accept=text/html) |
Basic Auth required via Authorization header.
curl -u user:pass "https://<your-worker>.workers.dev/proxy?url=https://example.com"- Request comes in with target URL
- Regular fetch with bot user-agent headers
- If 403 or paywall redirect detected -> browser fallback
- Content stripped of tracking/ads
- Reader styles injected
- Response cached and returned
Triggered automatically when:
- Response status is 403 (blocked)
- Redirect to paywall patterns (
/nocookies,/subscribe,/login, etc.)
Uses Cloudflare Browser Rendering to execute JavaScript and bypass client-side blocks.
pnpm install
pnpm devpnpm deploypnpm cf-typegen