Quick summary: scoped site permissions in 30 seconds
- Scoped site permissions mean the extension lists explicit match patterns—such as https://app.example.com/*—instead of “read and change all your data on all websites.” That shrinks accidental blast radius on random blogs and news sites.
- Concentrated risk remains: if the allowlist is exactly where you bank, file expenses, or trade crypto, the add-on still runs with DOM and API access on those high-value sessions.
- Developers can request optional host permissions at runtime; each new prompt widens scope, so treat incremental grants like fresh installs.
- Fake “narrow” manifests exist: long lists of unrelated finance or wallet hosts should trigger an immediate deny.
Real-world lens: one SaaS helper vs fake “narrow” lists
A well-documented Salesforce or Jira companion that lists only those domains matches user expectations. A PDF tool that also declares twenty exchange sites does not.
Compare scoped access with read-all-sites (max blast radius), active tab (often tighter interaction models), and how content scripts execute on the hosts you granted.
What scoped host access enables (patterns & optional grants)
- Inject content scripts, call host-restricted extension APIs, and hold long-lived access to declared origins whenever you navigate there—subject to manifest and runtime rules.
- Target high-sensitivity workflows: CRM fields, ITSM tickets, medical portals, or trading UIs—whatever domains appear in the allowlist.
- Request additional hosts later via optional permissions or updated manifests—useful UX for vendors, expanded surface for users who click through prompts without diffing the list.
Abuse scenarios: concentrated theft, pattern theater & mistakes
- Targeted fraud: a compromised update on an extension scoped only to your SSO or ERP still captures credentials and session context on those pages.
- “Scoped” theater: dozens of unrelated banking, wallet, or government domains listed together without a coherent product story.
- Pattern mistakes: typos or overly broad *.example.com rules can silently include more origins than reviewers expect.
Official docs: match patterns, content scripts & supply chain
Declaring scoped hosts, content scripts, and optional permissions
Chrome groups host_permissions, optional_host_permissions, and content script matches under shared match-pattern syntax—study subdomains, paths, and schemes before trusting a listing.Sources: Chrome — Declare permissions · Chrome — Content scripts
The permissions API documents runtime requests for additional hosts; permission warnings explain user-facing text—diff every update.Sources: Chrome — permissions API · Chrome — Permission warnings
Cross-browser patterns & third-party software risk
MDN’s match pattern reference aligns with Firefox WebExtensions expectations—useful when comparing multi-browser rollouts.Sources: MDN — Match patterns
National guidance treats third-party components with access to business apps as supply-chain risk—extensions scoped to ERP or SSO hosts belong in the same inventory.Sources: CISA — Software supply chain security · OWASP — Supply chain security · Google — Chrome Enterprise extension management
Practical tips: allowlist review, profiles & narrower models
- Read the full allowlist in the Chrome Web Store Permissions tab or unpacked manifest before install; screenshot it for comparison after updates.
- Challenge extensions that need payroll, wallet, or identity hosts when the marketing copy mentions unrelated features.
- Use enterprise policy or dedicated work profiles to block consumer extensions on machines that touch regulated apps.
- When a vendor offers active-tab-only or lighter models, compare trade-offs against scoped lists—read the all-sites, active-tab, and scripts deep dives before choosing.
Last reviewed: March 2026. Educational overview only—not legal advice; verify match-pattern behavior against current Chrome documentation.
FAQ: scoped host permissions & match patterns
Short answers for common searches—use with the risk and mitigation sections above for full context.
Further reading: Chrome match patterns & related eSafe guides
Start from every Chrome extension permission, then contrast all sites, active tab, and scripts.
- Chrome — Declare permissions
- Chrome — Content scripts
- Chrome — permissions API (optional hosts)
- Chrome — Permission warnings
- MDN — Match patterns
- CISA — Software supply chain security
- OWASP — Supply chain security project
- Google — Manage Chrome extensions (enterprise)
- eSafe — Full list of Chrome extension permissions
- eSafe — “Read all sites” host permission risks
- eSafe — Active tab permission
- eSafe — Content scripts & extension scripts
Related extension guides
These topics often show up together in real extensions and abuse reporting—reading them as a set makes it easier to judge combined risk.
- “Read and change all your data on every website” — what it really means
Plain-language deep dive on host permissions that cover every website: capabilities, real abuse cases, Chrome/Mozilla documentation, and independent research citations.
- Active tab access: power that (usually) waits for your click
What “act on the current tab when you click the extension” tends to mean in Chromium, how it differs from persistent host access, and where to read the official definition.
- Browser extensions & scripts / DOM (full guide)
Content scripts, scripting API, what “read and change all your data” means, cited incidents, and how to reduce scope.
Audit what is installed
Pair least-privilege installs with a periodic review—especially after any extension update.