Architecture
Jumper is designed as a browser-native bridge with clear trust boundaries.
Mental model
Section titled “Mental model”- The user is authenticated in a SaaS tab.
- Jumper maps visible UI elements into structured fields.
- A local or controlled MCP endpoint receives normalized payloads.
- AI tools consume those payloads through MCP contracts.
Runtime components
Section titled “Runtime components”- Browser tab context: source of truth for visible data.
- Jumper extension core: mapping, transform, policy, and audit controls.
- Console and side panel: operator feedback, mapping management, replay.
- MCP bridge endpoint: tool-facing interface for downstream systems.
Data flow
Section titled “Data flow”- Selector resolves against the live DOM.
- Raw value is extracted as text or attribute.
- Transformer normalizes to a typed schema.
- Payload is sent to MCP bridge.
- MCP tools execute downstream actions.
Security posture
Section titled “Security posture”- Session-aware extraction occurs in the authenticated browser context.
- Least-privilege mapping limits exposed fields to explicit selectors.
- Audit visibility keeps bridge operations reviewable.
- Local-first bridge option reduces external data propagation.
Operational recommendations
Section titled “Operational recommendations”- Treat mapping configs as code and version them.
- Prefer stable selectors anchored to semantic attributes.
- Gate production actions behind confirmation policies.
- Monitor payload drift when SaaS UI versions change.
Next: use Documentation hub and MCP registry to scale beyond one-off mappings.