Quick summary: extension screen capture in 30 seconds
- Chrome extension screen capture covers APIs such as desktopCapture and tabCapture: video (and sometimes audio) streams of tabs, windows, or full screens—whatever pixels you display while sharing.
- One frame can expose MFA codes, salary spreadsheets, private chats, customer PII, or recovery QR codes. Persistent or background capture is effectively shoulder-surfing at scale.
- Legitimate video conferencing, pair-programming, and IT screen-share tools need it; games, wallpapers, and vague optimizers do not.
- Exfiltration usually pairs capture with network access or native messaging—read the full manifest, not the capture line alone.
Real-world lens: Zoom-grade trust vs silent recorders
Users understand screen share inside a meeting they started. They do not expect a coupon extension to ever touch the capture APIs—same pixels, opposite trust story.
Exfiltration paths almost always include network access or native messaging. Pairing capture with read-all-sites rights lets attackers script lures before the share dialog even appears—treat the bundle as hostile until proven otherwise.
What screen capture enables (streams, recording & export)
- Trigger picker flows (desktopCapture) so users choose a surface to share, then pipe MediaStream objects into WebRTC peers, recorders, or image encoders.
- Capture specific tabs via tabCapture where supported—useful for Loom-style tools but still full DOM pixels for that tab.
- Combine with scripting, unlimited network, or native hosts to archive frames, OCR text, or stream live video off-device without a second obvious UI.
Abuse scenarios: MFA leaks, insider exfil & rushed prompts
- Credential and MFA leakage from authenticator apps, SMS panels, or backup code screens shown beside the browser.
- Covert recording of regulated data—HIPAA charts, legal discovery, unreleased product screenshots—violating policy even if “only” pixels leave the machine.
- Social engineering: rushed users approve share dialogs without reading which window is selected, enabling full-desktop grabs during a single slip.
Official docs: desktopCapture, tabCapture & web screen-capture model
Chromium extension capture APIs & install warnings
desktopCapture and tabCapture references enumerate entry points, stream types, and constraints—diff them each Chrome release if you ship or audit capture tooling.Sources: Chrome — desktopCapture API · Chrome — tabCapture API
Declare-permissions and permission-warnings describe what users see before install; reconcile those strings with runtime share prompts.Sources: Chrome — Declare permissions · Chrome — Permission warnings
Web platform primitives & insider-threat framing
MDN documents getDisplayMedia for web pages; W3C Screen Capture explains consent and surface-selection concepts that inform browser UX across extensions and sites.Sources: MDN — getDisplayMedia() · W3C — Screen Capture
NIST’s insider-threat materials remind enterprises that screen recording is a high-impact egress path—extensions belong in the same inventory as traditional DVR tools.Sources: NIST — Insider threat program
Practical tips: OS gates, session-only sharing & manifest audits
- Grant capture only to named tools you actively use for conferencing or support; deny every other category by default.
- Layer OS screen-recording permissions (macOS, Windows 11) so a second gate exists beyond Chrome’s prompt.
- Prefer per-session sharing inside trusted apps over always-installed capture extensions; remove dormant recorders.
- Audit manifests for capture plus network or native messaging; unexplained combos warrant immediate uninstall.
Last reviewed: March 2026. Educational overview only—not legal advice; verify API availability against current Chrome documentation.
FAQ: Chrome extension screen capture & sharing APIs
Short answers for common searches—use with the risk and mitigation sections above for full context.
Further reading: capture APIs & related eSafe guides
Cross-check every Chrome extension permission next to capture—especially all sites, native messaging, and network.
- Chrome — desktopCapture API
- Chrome — tabCapture API
- Chrome — Declare permissions
- Chrome — Permission warnings
- MDN — getDisplayMedia()
- W3C — Screen Capture
- NIST — Insider threat program
- eSafe — Full list of Chrome extension permissions
- eSafe — “Read all sites” host permission risks
- eSafe — Native messaging (desktop bridge risks)
- eSafe — Extension network permission
Related extension guides
These topics often show up together in real extensions and abuse reporting—reading them as a set makes it easier to judge combined risk.
- “Read and change all your data on every website” — what it really means
Plain-language deep dive on host permissions that cover every website: capabilities, real abuse cases, Chrome/Mozilla documentation, and independent research citations.
- Chrome Extension Native Messaging: Desktop Hosts, connectNative & OS Risk
Chrome extension native messaging: connectNative & host apps bridge the sandbox—supply-chain risk, signed binaries & pairing with downloads | eSafe
Audit what is installed
Pair least-privilege installs with a periodic review—especially after any extension update.