Open Source · MIT License

52 Tools.
One MCP Server.
Total Web Intelligence.

Tap into any website's DNA — design tokens, accessibility scores, tech stacks, security headers — all returned as structured JSON your AI agent can act on. Your agent decides which tools to call, combines the results, and presents them however you ask — a competitive teardown deck, an accessibility audit report, a design token file ready to drop into your codebase. 52 extraction tools. Infinite ways to use them. Runs locally. Supports authenticated sessions behind MFA and SSO. Zero config.

MCP Config
{
"mcpServers": {
"tapsite": {
"command": "npx",
"args": ["-y", "tapsite"]
}
}
}
tapsite
TSR-2026-0847
Mar 24, 2026 · 14:32 UTC
3.2s · 52 tools executed
Web Intelligence Report
https://acme.com
A+
Security
98
Accessibility
94
Performance
42
Design Tokens
7
Frameworks
Color Palette
14 colors extracted
#635BFF
#0A2540
#00D4AA
#425466
#7A73FF
#ADBDCC
#F6F9FC
#FF6059
Typography
3 font families
Aa Bb Cc
sohne-var · 400, 500, 700
01 { } =>
sohne-mono · 400
Performance Metrics
Core Web Vitals
LCP
1.2s
FID
12ms
CLS
0.03
TTFB
180ms
INP
52ms
Technology Stack
7 detected
Technology
Version
Category
Confidence
React
18.2.0
Framework
●●●●○
Next.js
14.1.2
Meta-framework
●●●●●
TypeScript
5.3
Language
●●●●○
Vercel
Hosting
●●●●●
Stripe.js
3.x
Payments
●●●○○
Cloudflare
CDN
●●●●●
Security Posture
Grade: A+
CSP
Strict with nonces
HSTS
max-age=31536000
SRI
All scripts verified
!
Permissions
Camera unrestricted
Generated by tapsite v4.5.1 · 52 tools · MIT License TSR-2026-0847
52
MCP Tools
33
Extraction Tools
6
Tool Modules
Zero
Config Required

Key Capabilities

palette

Design System Extraction

Extract color palettes, typography rules, spacing scales, CSS variables, shadows, and component patterns from any website. Get the complete design DNA as structured JSON.

COLORS FONTS CSS-VARS SPACING SHADOWS COMPONENTS
lock_open

Authenticated Browsing

Log in once through a headed browser — MFA, SSO, whatever the site requires. Session persists across all tool calls. Credentials never touch the wire.

shield

Prompt Injection Defense

Hidden element filtering at extraction time plus output sanitization before anything reaches your LLM. Two layers, zero trust.

verified_user

Security & Accessibility Audits

CSP scoring, SRI checks, WCAG compliance, contrast ratios — actionable letter grades, not just raw data.

dns

Tech Stack Intelligence

Framework detection, third-party script classification, storage profiling, WASM analysis — know what's under the hood.

52 Tools, 6 Modules

Every tool returns structured JSON designed for LLM context windows. One MCP server, modular by design.

open_in_browser
9 TOOLS

Session

Navigate, authenticate, interact, screenshot — persistent browser context across calls.

data_object
33 TOOLS

Extraction

Design tokens, content, forms, accessibility, security, performance, and more.

cell_tower
3 TOOLS

Network

Capture traffic, discover API schemas, detect tech stacks.

compare
2 TOOLS

Multi-page

Crawl sites and diff pages for visual regression.

download
2 TOOLS

Export

Generate JSON, Markdown, HTML reports, and CSV tables.

bolt
4 TOOLS

Workflows

One-command presets — full audit, harvest, design system, teardown.

Get Started in 60 Seconds

Three steps to web intelligence in your AI workflow.

01

1 Install

That's it. No API keys, no accounts, no config files.

npx -y tapsite
02

2 Add to your MCP client

Works with Claude Code, Cursor, Windsurf, or any MCP-compatible client.

{
"mcpServers": {
"tapsite": {
"command": "npx",
"args": ["-y", "tapsite"]
}
}
}
03

3 Ask your agent

Your agent calls the right tools and returns structured JSON. You decide what to do with it.

person

"Extract the design system from stripe.com"