Tabs in one minute
When you open Gmail in one window and a news article in another, each is a tab. The browser keeps metadata for every tab: which window it sits in, whether it is active, the URL (address), the title shown on the tab strip, and sometimes a small icon.
Normal websites cannot read your other tabs—that isolation is intentional. Extensions are trusted components with APIs such as chrome.tabs, so they can query or react to tabs across your profile when the install prompt grants the right permissions. That is powerful for tab managers and accessibility tools—and equally powerful for spyware.
Reported scale (with sources)
These figures come from named investigations and reporting. They illustrate real-world use of browsing and tab-level telemetry (URLs, titles, navigation)—not a live counter for all tab-permission abuse today.
- 4.3M
Users reported in a multi-year malicious-extension campaign (ShadyPanda)
Coverage of Koi’s research described extensions exfiltrating rich browsing telemetry—including, in reported examples, every URL visited, referrers, timestamps, and fingerprint-style data—after long-trusted extensions received harmful updates. See The Register.
- 4.1M
Users (per Google’s account, as reported) in the DataSpii extension privacy incident
Ars Technica documented extensions that collected the URLs, page titles, and in some cases embedded links from every page users visited, with histories exposed via a third-party analytics-style service. URLs alone can leak secrets when they contain unguessable tokens.
What tab-related permissions usually unlock
Chromium shows users friendly phrases like “read your browsing history” or “see your open tabs.” Under the hood, developers use the tabs API (often together with host_permissions or scripting). In everyday terms, that can mean:
- Enumerate open tabs — see addresses and titles across windows, know which tab is active, and tell when you switch sites.
- React to navigation — run logic whenever a tab loads or the URL changes (for example “whenever they open a bank, do X”).
- Open, close, or repoint tabs — spawn pop-ups, close windows, or change the address to a look-alike page.
- Inject scripts into tabs — when paired with host access, read or alter page content (often shown as broader “read/change site data” permissions).
- Capture what is on screen — APIs such as
captureVisibleTabcan snapshot the visible tab; that is separate from “tabs” in the menu but frequently co-requested by invasive tools.
Official API documentation lists the full surface area: Chrome tabs API reference.
Risk outcomes (plain language)
A running map of your behavior
URLs and titles expose health searches, payroll portals, political reading, and affair-adjacent patterns—no need to break encryption if the address bar already tells the story.
Token leaks in the address bar
Many apps put reset links, document IDs, or session hints in the URL. Collecting “just metadata” can still equal credential or document access, as described in DataSpii reporting.
Targeted timing
Knowing exactly when you open a billing or admin page enables injected overlays, fake MFA prompts, or timed exfiltration paired with other APIs (cookies, network rules).
Tab or search hijacking
Malicious code can change your new-tab page, redirect searches, or stack windows so you approve something while distracted.
Real-world patterns (documented)
- Whole-history style collection. DataSpii showed how extensions can vacuum every page’s URL and title into a pipeline that exposed sensitive links—see Ars Technica’s reporting.
- Scale surveillance after trust is built. ShadyPanda-related reporting described extensions that later shipped behavior to log browsing activity at large install counts—see The Register.
- Pairing tabs with other powers. Enterprise-targeting campaigns often combine knowing which SaaS tab is open with cookie theft or DOM blocking—our cookies deep-dive covers the session-token side.
What actually helps
- Question “tab manager” installs. If the tool is not from a brand you trust, broad tab visibility is a lot of data to hand over.
- Prefer “activeTab” style flows where the extension only digs deep into the tab you just clicked—narrower than always-on access to every open page.
- Split work and personal profiles so a compromised leisure extension never sees intranet or payroll tabs.
- Enterprise allowlists for extensions that legitimately need tab APIs (screen sharing, IT remote support, document tools).
- Review updates—a benign tab helper can gain new listeners or hosts after an auto-update.
See also our extension permissions guide and how to analyze an extension.
Sources for figures and background
Related extension guides
These topics often show up together in real extensions and abuse reporting—reading them as a set makes it easier to judge combined risk.
- Chrome Extension History Permission: What chrome.history Exposes & Risks
Chrome extension browsing history permission: chrome.history URLs & timestamps, profiling & spear-phishing—tabs, bookmarks & least-privilege checklist | eSafe
- Browser extensions & cookies (full guide)
Cookie APIs, HttpOnly limits, session theft, MFA, cited figures from reporting and research, and practical mitigations.
- Browser extensions & scripts / DOM (full guide)
Content scripts, scripting API, what “read and change all your data” means, cited incidents, and how to reduce scope.
- Browser extensions & network traffic (full guide)
Host permissions, fetch, declarativeNetRequest, redirects, documented abuse at reported scale, and mitigations.
Spot risky extensions earlier
eSafe helps you see extension risk and reduce noisy tracking—pair it with minimal installs and least privilege on tab-related prompts.