Quick figures (snapshots)
These callouts cite specific reports or papers—use them as orientation, not a live threat meter.
- Research
Free VPN / proxy extensions under scrutiny
Investigations and surveys (academic and journalistic) repeatedly find opaque data practices among no-cost VPN offerings—extensions inherit those trust issues.
What this access enables
- Redirect HTTP(S) connections through remote or local proxies depending on manifest and APIs available to your browser version.
- Combine with declarativeNetRequest or webRequest-style tooling to alter routing rules dynamically.
If it is abused or compromised
- Credential or cookie theft when TLS is broken or mis-terminated (especially with hostile proxies).
- Persistent surveillance of browsing patterns for resale.
Evidence, documentation, and reporting
Platform notes
Chromium documents proxy capabilities for extensions; capabilities evolved with Manifest V3—verify current support for your target browser.Sources: Chrome — proxy API (legacy reference; check MV3 status) · Chrome — declarativeNetRequest (modern request control)
Protocol & transparency context
IETF RFCs on TLS and HTTPS explain what middleboxes can and cannot see—useful when evaluating “we only metadata” claims.Sources: RFC 8446 — TLS 1.3
Practical mitigations
- Prefer system VPN clients from known vendors with published audits.
- Read privacy policies for extensions that touch traffic; absence is a signal.
- See also the eSafe article on free VPN extensions.
Frequently asked questions
Concise answers for this permission class—use with the evidence and mitigations above for full context and citations.
Further reading (curated)
Mix of vendor documentation, standards-style guidance, independent research, and news investigations—each page below is a different angle on the same permission class.
- Chrome — proxy API
- Chrome — declarativeNetRequest
- Chrome — MV3 migration
- RFC 8446 — TLS 1.3
- RFC 9110 — HTTP semantics
- IETF — QUIC working group
- FTC — VPN maker enforcement cases (search)
- Related eSafe guide — Free VPN extensions
- Related eSafe guide — Extensions & network
- ENISA — NIS2 / telecom security publications
- ITU — Study groups
Related extension guides
These topics often show up together in real extensions and abuse reporting—reading them as a set makes it easier to judge combined risk.
- Browser extensions & network traffic (full guide)
Host permissions, fetch, declarativeNetRequest, redirects, documented abuse at reported scale, and mitigations.
- Chrome declarativeNetRequest (DNR): Block & Redirect Rules, MV3 Risks & Updates
Chrome extension declarativeNetRequest (DNR): block & redirect requests, MV3 rule caps, phishing via tampered lists—permission & update checklist | eSafe
- Chrome Extension Privacy Settings Permission: chrome.privacy Risks & Audits
Chrome extension privacy settings: chrome.privacy can flip WebRTC, DNS & tracking toggles—silent rollback, hardening audits & combo with cookies/proxy | eSafe
Audit what is installed
Pair least-privilege installs with a periodic review—especially after any extension update.