diff-profile-archives
Diff Kernel Profile Archives
Compare the actual contents of two Kernel browser profiles to identify state differences that could explain a reported issue. The skill downloads both profile archives via the Kernel CLI, decompresses them, and produces a structured diff focused on the surfaces most likely to drive divergent behavior: cookies, local/session storage, preferences, extension state, login data, and history.
Inputs
The user must provide:
- Profile A — the "baseline" or "working" profile (ID or name)
- Profile B — the "subject" or "broken" profile (ID or name)
- Issue description — what's happening on B that isn't happening on A (e.g. "login flow on chase.com fails on profile B but works on A", "datadome challenge always fires on B but never on A", "saved credentials missing")
If any of these are missing, prompt for them before proceeding. The issue description is critical — it determines which surfaces of the profile to weight heavily in the diff.
Prerequisites
More from kernel/skills
kernel-agent-browser
Best practices for using agent-browser with Kernel cloud browsers. Use when automating websites with agent-browser -p kernel, dealing with bot detection, iframes, login persistence, or needing to find Kernel browser session IDs and live view URLs.
347kernel-cli
Complete guide to Kernel CLI - cloud browser platform with automation, deployment, and management
295kernel-typescript-sdk
Build browser automation scripts using the Kernel TypeScript SDK with Playwright, CDP, and remote browser management.
271kernel-python-sdk
Build browser automation scripts using the Kernel Python SDK with Playwright and remote browser management.
255kernel-auth
Setup and manage Kernel authentication connections for any website (Gmail, GitHub, Outlook, or custom domains). Handles managed auth flows with automatic reauthentication support.
246profile-website-bot-detection
Profile a website for bot detection vendors using stealth vs non-stealth Kernel browsers. Use when analyzing bot detection on a website, comparing stealth effectiveness, identifying anti-bot vendors and products, or detecting challenge types.
219