Common Chrome-style permissions and risk levels
Read and change all your data on every website you visit
Risk: CriticalLike someone standing behind you on every website you visit: they can see what you see, change what appears—often by running scripts that alter the page (inject ads, swap buttons), and read what you type into the page. This is usually the broadest permission in the install prompt.
Example: Makes sense for: ad blockers, some in-page note tools. Suspicious: a tiny “dark mode” or wallpaper extension that still asks for access to banking, email, and social sites.
The add-on may only touch certain addresses the developer declares (for example one learning site or one work app). Narrower than “every site,” but still serious if that list includes login or payment pages.
Example: Makes sense for: a companion that adds features to one trusted work site. Suspicious: a vague “free” tool that wants access to your bank or wallet site with no clear reason.
Often described as “when you use it”: deep access to the active tab kicks in mainly after you click the extension icon. That time limit is much safer than running in the background on every page all day.
Example: Makes sense for: partial screenshots, translating a paragraph you are reading. Odd: an extension that rarely needs a click but still bundles other broad permissions—read the full list.
It can tell which pages you have open—in practice, what shows up in your open tabs (site name and URL path). That is not always the same as reading full page content, but it still exposes habits, accounts, and sensitive topics.
Example: Makes sense for: tab managers and session organizers. Suspicious: games or “themes” that want tab access without a clear need.
See and change your browsing history
Risk: HighAccess to where you have been before—your browsing history. Useful for real features (recent pages), but also enough to sketch your interests, health topics, or money habits over time.
Example: Makes sense for: history cleaners or “recently closed” helpers from a known vendor. Suspicious: an extension unrelated to history that still asks for this.
Save settings on your device (Chrome storage permission)
Risk: Very lowThe Chrome extension storage permission (chrome.storage) keeps choices like theme, language, and toggles. Alone it is usually low risk; it becomes sensitive when paired with broad site, network, or proxy access.
Example: Makes sense for: almost every extension needs somewhere to remember settings. Worry when it is paired with very broad access (all sites, proxy, etc.).
Manage or monitor your downloads
Risk: HighMay see what you download, sometimes change save locations or hook the download flow. If abused, malware could ride along downloads you trust.
Example: Makes sense for: download managers or post-download scanning from a reputable brand. Suspicious: unrelated extensions that still want download access.
See or change whatever you copy and paste—temporary passwords, one-time codes, crypto addresses. One bad paste can mean lost money or a hijacked account.
Example: Makes sense for: formatters or quick-translate tools you deliberately use. Suspicious: vague utilities that want continuous clipboard access.
Show notifications
Risk: MediumPop system toasts like app alerts. Handy for reminders, but also an easy channel for scare messages (“your PC is infected”) or nudging you toward bad links.
Example: Makes sense for: calendars, study reminders, order tracking. Suspicious: endless promos or fake security warnings.
Can flip options tied to cookies, tracking protection, secure DNS, and similar. If misused, protections you think are on could be turned off quietly.
Example: Makes sense for: security tools with a clear explanation and named company. Suspicious: anonymous “speed boost” extensions asking to change privacy settings.
Browser traffic may go through the developer’s servers. They can often see which sites you visit (encrypted pages still reveal hostnames), block content, or alter what comes back.
Example: Makes sense for: VPN/proxy brands you trust with readable policies. Suspicious: “free forever” VPNs with no company address and inflated reviews.
Like a traffic filter: the extension allows, blocks, or redirects some network requests. Great for ads and trackers, but harmful if rules are tampered with to send you to phishing sites.
Example: Makes sense for: ad blockers, parental filters. Requires trust and updates—rule sets can change when the extension updates.
Capture your screen or record a tab / window
Risk: CriticalGrabs an image of what you see—messages, pay stubs, QR codes. Extremely sensitive; effectively “looking over your shoulder.”
Example: Makes sense for: video calls or IT support when you choose to share. Suspicious: unrelated extensions requesting capture without a clear feature.
Bridges the browser to a program outside the browser. Useful for hardware wallets or desktop password managers, but also a path for abuse if the desktop side is malicious.
Example: Makes sense for: a suite from one vendor where you already installed their official app. Suspicious: prompts to install unknown extras from sketchy sources.
Install or remove other extensions
Risk: CriticalCan add or remove extensions for you—close to admin power. Very few legitimate consumer tools need this outside IT-managed setups.
Example: Makes sense for: almost only enterprise tooling your company controls. For personal use: almost always a red flag.
Know your location
Risk: MediumLearns roughly or precisely where you are, depending on the browser and OS prompts. Helpful for maps and weather; still sensitive if sold or misused.
Example: Makes sense for: directions, ride-hailing, weather. Suspicious: extensions with no location-based feature that still request it.
Read your bookmarks
Risk: MediumSees sites you saved for quick return. Less invasive than “all open tabs,” but still reveals interests and sometimes internal work links you bookmark often.
Example: Makes sense for: sync or bookmark cleanup. Suspicious: games or themes with no bookmark feature.
Extension permissions FAQ
See what is running in your browser
eSafe helps surface risky extensions, cut noisy tracking, and harden checkout flows—alongside the habit of only installing add-ons you truly need.