claude-in-chrome-troubleshooting
Diagnose and resolve Claude in Chrome MCP extension connectivity conflicts on macOS.
- Addresses the primary issue: Claude.app (Cowork) and Claude Code CLI use competing native messaging hosts with incompatible socket formats; fix by disabling one config and restarting both Chrome and Claude Code
- Provides quick diagnosis commands to identify which native host is running, locate socket files, and verify active configurations
- Includes a toggle script to switch between Claude.app and Claude Code without manual file moves
- Covers secondary causes: multiple Chrome profiles, hardcoded version wrappers, multiple Claude Code sessions, and unset TMPDIR environment variable
- macOS-specific; uses paths like
~/Library/Application Support/and tools likeosascript
Claude in Chrome MCP Troubleshooting
Use this skill when Claude in Chrome MCP tools fail to connect or work unreliably.
When to Use
mcp__claude-in-chrome__*tools fail with "Browser extension is not connected"- Browser automation works erratically or times out
- After updating Claude Code or Claude.app
- When switching between Claude Code CLI and Claude.app (Cowork)
- Native host process is running but MCP tools still fail
When NOT to Use
- Linux or Windows users - This skill covers macOS-specific paths and tools (
~/Library/Application Support/,osascript) - General Chrome automation issues unrelated to the Claude extension
- Claude.app desktop issues (not browser-related)
- Network connectivity problems
- Chrome extension installation issues (use Chrome Web Store support)
More from trailofbits/skills
ask-questions-if-underspecified
Clarify requirements before implementing. Use when serious doubts arise.
4.2Ksemgrep
>-
3.8Kmodern-python
Configures Python projects with modern tooling (uv, ruff, ty). Use when creating projects, writing standalone scripts, or migrating from pip/Poetry/mypy/black.
3.8Kcodeql
>-
3.6Kinsecure-defaults
Detects fail-open insecure defaults (hardcoded secrets, weak auth, permissive security) that allow apps to run insecurely in production. Use when auditing security, reviewing config management, or analyzing environment variable handling.
3.5Ksecure-workflow-guide
Guides through Trail of Bits' 5-step secure development workflow. Runs Slither scans, checks special features (upgradeability/ERC conformance/token integration), generates visual security diagrams, helps document security properties for fuzzing/verification, and reviews manual security areas.
3.4K