Extension Auditor
by ishangirdhar
Beskyttelse af personlige oplysninger
Privacy Policy Last updated: January 7, 2025 Overview Extension Auditor is a powerful browser extension that helps users understand and evaluate the security implications of their installed browser extensions. We are committed to protecting your privacy and ensuring that our extension operates with minimal permissions while providing maximum security benefits. Data Collection & Privacy Focus What We Analyze Installed extensions and their metadata Extension permissions and their security implications Host access patterns and potential privacy risks Content script interactions with web pages Extension manifest settings and security practices Combined risk assessment based on multiple security factors Privacy Commitment Extension Auditor runs entirely in your browser and does not: Collect any personal data Send data to external servers Modify any other extensions Modify webpage content Track browsing history or behavior Store any data outside your browser Required Permissions Management Permission The management permission is essential for our core functionality. It allows us to: List and access information about installed extensions Get detailed extension information and manifest details Monitor extension lifecycle events Check permissions and security settings Track extension states (enabled/disabled) Access Content Security Policy settings How It Works On-device Analysis Extension Auditor performs all analysis locally in your browser, evaluating: Permission Analysis: Evaluates permissions and their security implications Host Access: Identifies broad host permissions that could pose privacy risks Content Script Analysis: Examines how extensions interact with web pages Manifest Analysis: Reviews extension manifest settings for security best practices Combined Risk Assessment: Calculates overall risk based on multiple security factors Risk Classification Critical: Highly sensitive permissions or combinations that could be dangerous if misused High: Permissions that could potentially be used maliciously Medium: Permissions that require caution as they provide significant capabilities Low: Permissions with limited potential for misuse Contact Us If you have any questions about our privacy policy or security practices, please contact us at ishan@extensionauditor.com
Se den fulde tekst for politikken for beskyttelse af personlige oplysninger.