When your agent tries to read a webpage, it gets blocked. Wick gives it the same access you have — running locally, from your own IP.
$ brew tap myleshorton/wick && brew install wick && wick setup
Copied!
Modern websites fingerprint incoming connections at multiple layers. Your AI agent's HTTP requests look nothing like a real browser — different network signature, different protocol behavior, missing browser signals. The result: 403 errors, CAPTCHA walls, or degraded content. Your agent is left apologizing instead of helping.
Wick runs as a lightweight local service on your machine. When your agent needs to fetch a page, Wick handles the request using the same technology real browsers use — authentic, not mimicked. The request goes out from your own residential IP, with your own cookies. To the website, it looks like you browsing normally. Because it basically is.
Everything your agent needs to access the real web, nothing it doesn't.
Wick uses the same networking technology as real browsers. Not an imitation — the real thing. Websites can't tell the difference because there isn't one.
Everything happens on your machine. No cloud proxy, no third-party servers. Your data never leaves your network unless you're the one sending it.
Raw HTML is useless to an LLM. Wick strips boilerplate, navigation, and ads, returning clean, structured markdown your agent can actually use.
No pooled residential IPs. No sketchy proxy networks. Requests go out from your own connection — because you're the one making them, through your agent.
Designed for AI agents from day one. Works instantly with Claude Code, Cursor, Windsurf, and any MCP-compatible client. One command to install.
wick_search lets your agent search the web and get results with titles, URLs, and snippets. Then wick_fetch reads any result in full.
Wick is MIT-licensed and costs nothing to run. Built by a team with over a decade of experience in internet access technology.
For developers and individual agents
For companies accessing high-value data
Run Wick on a cloud server but exit from your residential IP. Two commands, zero configuration files.
sudo wick-tunnel init
Generates a join token. One line, installs WireGuard if needed.
sudo wick-tunnel join <token>
Your laptop's residential IP is now available to the server. Survives wifi changes.
wick fetch https://any-site.com
Chrome fingerprint + your residential IP. Sites can't tell it's not your browser.
| Wick Free | Wick Pro | Firecrawl | Bright Data MCP | Browserbase | Playwright MCP | |
|---|---|---|---|---|---|---|
| Anti-bot bypass | ✓ | ✓✓ | ✗ | Partial | ✗ | ✗ |
| JS rendering | ✗ | ✓ | ✓ | ✓ | ✓ | ✓ |
| Runs locally | ✓ | ✓ | ✗ | ✗ | ✗ | ✓ |
| Your residential IP | ✓ | ✓ | ✗ | Pooled | ✗ | ✓ |
| Clean markdown | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ |
| No data sent to cloud | ✓ | ✓ | ✗ | ✗ | ✗ | ✓ |
| MCP native | ✓ | ✓ | ✓ | ✓ | ✗ | ✓ |
| Free tier | Forever | — | 500 pages | 5K requests | Trial | Free |
| Paid pricing | $0 | Custom | $19+/mo | Usage-based | $150+/mo | $0 |
brew tap myleshorton/wick && brew install wick
Auto-detects Claude Code, Cursor, and other MCP clients.
wick setup
Your agent now has wick_fetch and wick_search. Search the web, read any page.
Free and open source for developers. Custom solutions for companies that need more.