Description
When using puppeteer-extra with the stealth plugin to access Grok.com, the script is consistently detected as automated access and redirected to a Cloudflare challenge page at accounts.x.ai since 30 March 2025.
Despite implementing multiple stealth measures (custom user agents, hardware fingerprinting evasion, and randomized human-like behavior), the bot detection mechanisms still successfully identify the script as automated.
The issue appears to be with the stealth plugin's inability to convincingly mimic a real human browser session against Cloudflare's latest detection methods. After successfully navigating to grok.com and then to grok.com/chat, any interaction that requires authentication triggers redirection to accounts.x.ai with a CAPTCHA challenge.
Expected behavior: Script should appear as a normal browser session and not trigger Cloudflare bot detection.
Actual behavior: Script is consistently identified as automated and redirected to Cloudflare CAPTCHA page.