Know your Chrome Extensions: Security & Manifest V3

11 - Copy

Know your Chrome Extensions: Security & Manifest V3

Chrome extensions are small software programs that customize your browsing experience. They can enhance productivity, block ads, manage passwords, and more.
However, with great power comes great responsibility. These extensions can access your browser’s content and potentially access sensitive information, making them a target for malicious activities.

The Dangers of Chrome Extensions

While Chrome extensions can be beneficial, they also come with risks:

  • Data Privacy: Some extensions can collect and misuse your personal data, track browsing habits, and capture sensitive information.
  • Malware: Malicious extensions can inject harmful code into websites you visit, leading to phishing attacks or unauthorized data access.
  • Unauthorized Access: Extensions with excessive permissions can gain more control over your browser and system than necessary, increasing the risk of exploitation.

How Manifest V3 Helps Mitigate Risks

To address these concerns, Google introduced Manifest V3—a significant update to the Chrome extension platform. Manifest V3 is designed with security, privacy, and performance in mind. It restricts the power of extensions, making it harder for malicious actors to exploit them. Here’s how:

  • Limited Permissions: Extensions now require fewer permissions to function, reducing the attack surface. Developers must justify the permissions they request, and the new API restricts access to potentially dangerous capabilities.
  • Enhanced Privacy: Manifest V3 blocks extensions from running in the background indefinitely, which limits their ability to collect data over long periods.
  • Improved Performance: By restricting background scripts and forcing extensions to use service workers, Manifest V3 improves browser performance and reduces the risk of resource abuse.

The Atmoz Approach: Security with Minimal Permissions

At Atmoz, we extend native cloud tools to ensure no human errors are made in cloud environments and to deliver the best possible cloud experience. One of our key offerings is the Chrome extension Atmoz, which is currently available as a public beta on the Chrome Web Store here. This extension enriches the Azure portal, making it the best cloud portal to use ever.

Built using Manifest V3, our extension requires only the essential permissions needed to provide you with a secure and seamless experience. We also limit our extension to specific hosts: https://portal.azure.com/* and https://management.azure.com/*, ensuring that our access is as focused and minimal as possible.

Here’s a breakdown of the permissions we use and how they serve you:

  • storage: This permission allows us to securely store user preferences and settings within the browser. By keeping this data local, we ensure that your information is not exposed to external servers unless absolutely necessary.
  • activeTab: We use this permission to interact with the content of the active tab when you choose to engage with the extension. This means we only access the web page you’re currently viewing, ensuring minimal intrusion.
  • webRequest: This permission is crucial for monitoring and intercepting network requests. We use it to enhance security and enrich your experience in the Azure portal, particularly for non-logged-in users. However, after you register, this permission is no longer required, further reducing our footprint.
  • identity: The identity permission allows our extension to provide Azure Single Sign-On (SSO) integration. This ensures a secure and seamless login experience, allowing you to authenticate using your existing Azure credentials while protecting against unauthorized access.

Conclusion

Chrome extensions can greatly enhance your browsing experience, but they also come with inherent risks. By adhering to Manifest V3, limiting permissions, and restricting access to specific hosts, Atmoz ensures that your security is never compromised. With tools like Atmoz, we’re committed to making your cloud experience the best it can be—secure, efficient, and error-free.

Continue Reading

7 - Copy

We are human, and therefore we make mistakes – part I

We are human, and therefore we make mistakes. In the [...]

13

Example Article for News Section

How hundreds of thousands of dollars Slip Through the Cracks [...]

DALL·E 2025-02-10 23.38.58 - A futuristic dashboard displaying real-time cloud cost metrics overlaid on a developer's screen. The screen shows lines of code, CLI outputs, and floa

Exposing Developers to Cloud Costs in Real-Time: A DIY Approach

Cloud computing has made infrastructure accessible, but it has also [...]