TSTrustScan
All PostsSecurity Guide
Security GuideMarch 14, 2026ยท7 min read

How to Check If a Browser Extension Is Safe (2026)

Browser extensions have direct access to your browsing data, passwords, and online activity. In 2025, malicious extensions stole data from over 2.3 million users. Here is exactly how to audit any extension before you install it.

The Problem Is Bigger Than You Think

In late 2025, security researchers discovered a campaign of over 30 malicious Chrome extensions that had been stealing data for months. Some had Featured badges in the Chrome Web Store. Some had millions of downloads. Users had no idea their browsing history, cookies, and login sessions were being exfiltrated to remote servers.

This is not an edge case. Browser extensions operate with privileged access inside your browser. A single extension with the wrong permissions can see every website you visit, read your passwords as you type them, capture your clipboard contents, and modify the pages you see. The Chrome Web Store's review process catches many threats, but it is not perfect.

The good news: you can evaluate an extension's risk yourself by understanding what its permissions actually mean.

How to Find an Extension's Permissions

Before analyzing permissions, you need to find them.

Chrome
Go to chrome://extensions, click 'Details' on any extension, scroll to 'Permissions'. You can also see permissions on the Chrome Web Store page before installing.
Firefox
Go to about:addons, click an extension, check the 'Permissions' tab. Firefox also shows permissions in a popup when you first install an extension.
Edge
Go to edge://extensions, click 'Details', scroll to 'Permissions'. Edge uses the same extension format as Chrome.
Before installing
Both the Chrome Web Store and Firefox Add-ons pages show required permissions before you install. Always review these first.

The 4 Permission Risk Levels

Not all permissions are equal. We categorize them into four risk levels based on what they can access and the potential for abuse.

๐ŸŸฃ Critical
These permissions give an extension near-total control over your browser or computer. 'Access all websites' lets it read every page. 'Native messaging' lets it run programs on your device. 'Proxy settings' lets it route all your traffic through a third-party server. 'Debugger access' lets it intercept HTTPS traffic. Only install extensions with these permissions if you have verified the developer and source code.
๐Ÿ”ด High
These permissions can access sensitive personal data. 'Browsing history' reveals your full web activity. 'Read cookies' can capture login sessions. 'Read clipboard' can grab copied passwords. 'Manage downloads' could silently download files. Each of these is a serious privacy risk on its own โ€” combined, they create a comprehensive surveillance capability.
๐ŸŸก Medium
These permissions have legitimate uses but still carry some risk. 'Show notifications' could be used for phishing. 'Access location' reveals where you are. 'Access bookmarks' reveals your interests. 'Write to clipboard' could replace copied content with malicious links.
๐ŸŸข Low
These permissions are generally safe. 'Active tab only' is the gold standard โ€” it only accesses the current page when you explicitly click the extension. 'Alarms', 'font settings', and 'browser theme' have no access to browsing data.
Free Tool

Audit any extension in seconds

Select the permissions your extension requests and get a security risk score with detailed explanations and recommendations. 100% client-side.

Audit an Extension โ†’

Dangerous Permission Combinations

Some permissions are more dangerous in combination than alone. These are the pairings that should raise immediate red flags:

โš ๏ธ Cookies + All Websites
Can hijack any logged-in session on any website. The extension can read your session tokens and impersonate you on banking sites, email, social media โ€” anything.
โš ๏ธ Downloads + Native Messaging
Can download files and execute them on your computer. This bypasses the browser sandbox entirely and is functionally equivalent to running arbitrary code on your machine.
โš ๏ธ Web Request + All Websites
Can intercept, modify, and redirect every network request your browser makes. Could redirect you to phishing sites, inject ads, or capture form data before it is encrypted.
โš ๏ธ Management + Any Other
Can disable your other extensions, including security tools like ad blockers and privacy extensions. This is often a precursor to other attacks โ€” disable protections first, then exploit.

We Audited 6 Common Extension Types

To show what typical permission profiles look like, we ran six common extension categories through TrustScan's Extension Security Auditor.

TypeScoreRiskKey Concern
Dark Mode82/100๐ŸŸข LowMinimal permissions โ€” just active tab and storage
Ad Blocker49/100๐ŸŸก MediumNeeds web request interception to function, but this is powerful
Screenshot Tool40/100๐ŸŸก MediumPage capture + downloads + tab access
Grammarly-type24/100๐Ÿ”ด HighAll websites + cookies โ€” can see everything you type
VPN Extension20/100๐Ÿ”ด HighProxy + web request โ€” routes and monitors all traffic
Password Manager19/100๐Ÿ”ด HighAll websites + clipboard โ€” necessary but extremely powerful

Notice that password managers and VPN extensions score as High Risk. This does not mean they are malicious โ€” it means their permissions are inherently powerful. These tools need broad access to function. The key is making sure you trust the developer, the extension has a strong track record, and the source code is auditable.

5 Rules for Browser Extension Safety

1. Check permissions before installing
Always review what an extension requests before clicking 'Add to Chrome'. If a calculator extension asks for 'Access all websites', that is a red flag.
2. Fewer permissions is better
Extensions that use 'Active tab only' instead of 'Access all websites' are respecting the principle of least privilege. Prefer these when alternatives exist.
3. Remove extensions you do not use
Every installed extension is an attack surface, even if you never click it. Extensions run in the background and can receive silent updates that change their behavior.
4. Audit monthly
Extensions update automatically. An extension that was safe last month may have new permissions or new code this month. Set a monthly reminder to review your extensions.
5. Verify the developer
Check if the developer has a website, a GitHub presence, and a history of maintaining extensions. Anonymous developers with no track record are higher risk.

Audit Your Extensions Now

Every extension in your browser has a permission profile that determines exactly what it can access. Most people never check. TrustScan's Extension Security Auditor lets you select an extension's permissions and instantly see a risk score, detailed explanations, dangerous combinations, and specific recommendations. It runs 100% in your browser with no data sent anywhere.

Start by auditing the extension you use most. The results might surprise you.

TS
TrustScan Team

Cybersecurity professionals building free privacy tools for the 2026 compliance landscape.

Frequently Asked Questions