PrivacyScope never contacts any server we operate.
All analysis runs locally using Chrome's built-in extension management API —
the same data source as chrome://extensions.
Your extension list never leaves your device.
The only external requests PrivacyScope ever makes are to clients2.google.com —
Google's own CRX download server — when you visit a Chrome Web Store detail page.
This is the same server Chrome uses to install extensions.
How it works
Every extension ships with a public manifest.json listing every permission
it requests. PrivacyScope reads this via Chrome's management API —
no special access needed. You can see the same data at
chrome://extensions → Details → Permissions.
Each permission is assigned a risk score based on what it enables.
An extension that can read every website plus access your cookies
scores far higher than one that only uses storage.
Dangerous combinations — like <all_urls> with webRequest —
add a bonus penalty.
Technical permission names are converted to plain descriptions of what they actually enable — no jargon. The flags you see in the popup map directly to specific permissions in the manifest.
Score breakdown
Each flag in the popup corresponds to a specific manifest permission. You can verify any flag yourself: open the Chrome Web Store listing and check the Permissions tab — it lists exactly what the extension declared.
High-risk permissions
<all_urls>cookiesdebuggernativeMessagingproxyhistorywebRequest + broad hostclipboardReadMedium-risk permissions
tabsbrowsingDatadownloadssessionsRisk levels
<all_urls> + cookies + webRequest)
How to investigate a flagged extension
When PrivacyScope flags an extension, here is exactly what to look for — in order of effort:
-
Check the Permissions tab on the Chrome Web Store listing.
Every CWS page has a "Permissions" section. It should match what PrivacyScope shows. If an extension claims to be a simple tool but requests
<all_urls>, that's a red flag. -
Check the Privacy practices tab.
Extensions that collect or transmit data are required to disclose it here. No privacy policy on an extension with broad permissions is a serious warning sign.
-
Search for "[extension name] privacy" or "[extension name] data collection".
Security researchers frequently document extension misbehavior. A 30-second search often reveals prior incidents or community reports.
-
Check the developer's identity.
An extension from Google, Mozilla, or a known company with a real website is meaningfully different from an anonymous publisher with no web presence.
-
Look for the source code.
Many legitimate extensions are open source. A linked GitHub repository means researchers can and do audit what the code actually does.
-
Check CWS review count and recency.
A large number of genuine reviews (not a sudden spike of 5-star ratings) suggests an extension with real accountability to its users.
Limitations
<all_urls> and scores "Review recommended."
That's technically correct and practically fine. A high score means investigate, not uninstall immediately.
About the developer
Support this project
PrivacyScope is free and will stay free. If it's helped you avoid a risky extension, a coffee keeps the project going. ☕