How to ensure that this plug-in will not steal cookies?
How to ensure that the version you publish in the Google plug-in center is consistent with the one you open source, and not a backdoor version?
Answer:
Good question!
- How to ensure that this detection plug-in will not steal cookies?
The premise of the plug-in to obtain cookies is that the cookie permission field needs to be set to obtain cookies. First of all, this plug-in code is 100% open source, and you can directly view the source code to check the permissions of this plug-in. Secondly, you can also manually check the actual folder path of the plug-in on macOS and check the mainfest to check the real permission field. It is very easy to verify. This is the method of manually checking permissions for reference: sshallow/WhoUsesCookies: Displays the permissions of the extensions you installed and shows who is accessing your cookies. (github.com)
- How to ensure that the version released in the Google Plugin Center is consistent with your open source version, and not a backdoor version?
As the answer to question 1, you can manually check the actual extension folder path on macOS, check the mainfest to check the real permission field to verify the actual permissions used. Of course, it is also strongly recommended to install it yourself using the source code!
WhoUsesCookies is a Chrome browser extension designed to help users detect and monitor whether all extensions have permission to read their browser cookies. With the increasing popularity of web3 and cryptocurrency, protecting personal wallet data and privacy has become particularly important.
-
Permission detection: Quickly view the permissions used by all extensions and see which extensions have permission to read your browser cookies
-
One-click disable: One-click disable plugins
2024-06-06.09.20.52.mov
-
Install the extension: Add the extension to your Chrome/Edge browser.
-
View permissions: Click on the "WhoUsesCookies" icon on the browser toolbar to see which extensions are accessing your cookies.
There are two ways to install the WhoUsesCookies extension:
- Download the extension: Go to the releases page and download the WhoUsesCookies zip file.
- Enable developer mode: Type
chrome://extensions/
oredge://extensions
in the Chrome or Edge browser address bar to enable "developer mode". - Install the extension: Use the "Load unpacked extension" option to select the unpacked extension folder.
- View permissions: After installation, click on the "WhoUsesCookies" icon on the browser toolbar to open a pop-up window to see which extensions are accessing your cookies.
- Clone the code base:
[email protected]:sshallow/WhoUsesCookies.git
. - Enter the project directory:
cd WhoUsesCookies
. - (Highly recommended) Install pnpm:
npm install --location=global pnpm
. - Install dependencies:
pnpm install
. - Package and build the extension:
pnpm build
. - Enable developer mode: Enter
chrome://extensions/
oredge://extensions
in the Chrome or Edge browser address bar to enable "developer mode". - Install: Click "Load unpacked program" and select the
build/chrome-mv3-prod
folder in the project directory. - View permissions: After installation, click the "Who is using cookies" icon on the browser toolbar to open a pop-up window to view which extensions are accessing your cookies.
Enjoy!
Detailed steps to manually check browser extension permissions on macOS. Windows users can query the path of the extension by themselves, the principle is the same.
- Open Finder and go to Edge's profile folder (shift+command+g):
~/Library/Application Support/Microsoft Edge/
- Find the
Extensions
folder in theDefault
folder or a folder similar toProfile 1 (Profile+number)
. - After entering the
Default/Extensions
orProfile 1/Extensions
folder, find the corresponding folder according to the extension ID and open themanifest.json
in it - Open the
manifest.json
file in the folder and check thepermissions
field. For example:The above permissions include:"permissions": [ "storage", "https://*/*", "http://*/*", "file://*/*", "tabCapture", "webNavigation" ]
storage
,tabCapture
,webNavigation
, and domain scopeshttps://*/*
,http://*/*
andfile://*/*
.
-
Open Finder and go to Chrome's profile folder (shift+command+g):
~/Library/Application Support/Google/Chrome/Default/
-
Find the
Extensions
folder in theDefault
folder or a folder similar toProfile 1 (Profile+number)
. -
After entering the
Default/Extensions
orProfile 1/Extensions
folder, find the corresponding folder according to the extension ID and open themanifest.json
in it -
Open the
manifest.json
file in the folder and check thepermissions
field. For example:"permissions": [ "storage", "https://*/*", "http://*/*", "file://*/*", "tabCapture", "webNavigation" ]
The above permissions include:
storage
,tabCapture
,webNavigation
, and domain rangeshttps://*/*
,http://*/*
andfile://*/*
.
Refer to the following image for the specific path:
Using the above method, you can manually check whether the installed browser extensions have permission to access sensitive information such as cookies.
If you run into any issues or have suggestions for improvements, please file an issue or submit a pull request on GitHub.
This project is licensed under the MIT License.
If you find this extension useful and want to support its development, feel free to buy me a coffee!