The Stealth Orchestrator operates within defined scope bands and acknowledges explicit limits. These boundaries provide realistic expectations for throughput, cadence, and resilience.Documentation Index
Fetch the complete documentation index at: https://none-38c466ad.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
10.1 Scope Bands
- Concurrency: per-domain inflight requests capped at human-plausible levels ( small, constant)
- Duty cycle: long-run request rates are governed by , where bans trigger cooldowns instead of retries
- Resolution: DNS lookups follow bounded cache lifetimes and refresh deterministically with transport changes
- Fingerprint/session reuse: browser identities and cookies are reused for bounded lifetimes, then rotated in controlled fashion
- Transport diversity: outbound traffic reuses stable proxy paths per domain, with TLS signatures drawn from a small set of real browser profiles
10.2 Known Limits
-
Blind spots:
- Systems that require hardware-bound keys or device certificates (cannot be faked by software)
- Web application firewalls that issue one-off challenges tied to a specific device session
- Internal enterprise DNS setups that intentionally give different answers to the same query (split horizon)
- Rapid browser/TLS updates that introduce new handshake patterns not yet in the curated profile set
-
Non-goals:
- Extracting or enriching page content
- Building or renting large proxy pools
- Solving CAPTCHAs, proof-of-work challenges, or similar interactive tests
- Bypassing legal access controls or lawful processes
-
Failure cases:
- Too few proxy endpoints can still make traffic stand out
- Over-use of the same fingerprint can make sessions too long-lived
- DNS cache misconfiguration can cause stale or inconsistent answers