Skills ultimate-freedom-protocol
Ultimate Web Freedom Protocol (v9.0.0). Leverages 'Protocol Phantom' (curl_cffi kernel-level TLS impersonation) to bypass DataDome, Cloudflare, and Bilibili. Ideal for undetectable server-side data extraction.
install
source · Clone the upstream repo
git clone https://github.com/openclaw/skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/openclaw/skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/biogod2020/ultimate-freedom-protocol" ~/.claude/skills/clawdbot-skills-ultimate-freedom-protocol && rm -rf "$T"
manifest:
skills/biogod2020/ultimate-freedom-protocol/SKILL.mdsource content
Ultimate Freedom Protocol (SOTA v9.0.0)
This protocol replaces traditional headless browsing with "Protocol Phantom" technology, focusing on kernel-level network fingerprint alignment.
🚀 Core Pillar: Protocol Phantom (CFFI Mode)
Traditional scrapers are identified by their TLS handshake. This toolkit uses
curl_cffi to mirror real-world browser profiles at the binary level.
Key Capabilities:
- JA4 Fingerprinting: Perfect alignment with Chrome 124+ and Safari iOS 17.
- WAF Penetration: Successfully proven against DataDome, Akamai, and Bilibili's 412/403 blocks.
- Zero Resource Waste: No need for heavy Xvfb/D-Bus overhead unless complex JS interaction is required.
🛠️ Unified Entry
The
freedom_engine.py provides a standardized interface for all penetration tasks.
Version: 9.0.0 (Phantom Core) | Author: Biogod2020 | Status: PROD