Chrome Extension

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This is a coherent instruction-only Chrome extension development guide, but it covers powerful browser-extension capabilities that users should scope carefully.

This skill appears safe as an instruction-only Chrome extension guide. Before installing or using it, be aware that it may help generate extensions with powerful browser capabilities; review requested Chrome permissions, keep host access narrow, and approve npm/git/gh commands only when they match your intended task.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the agent uses these tools, it may change project files, run package scripts, or interact with GitHub through an existing login.

Why it was flagged

The skill can edit files and run git, npm, and GitHub CLI commands. This is expected for a development assistant, but these commands can mutate local projects or authenticated GitHub state.

Skill content
allowed-tools: Read Edit Write Glob Grep Bash(git:*) Bash(gh:*) Bash(npm:*) AskUserQuestion
Recommendation

Review proposed npm, git, and gh commands before approving them, especially commands that publish, push, install, or modify repositories.

What this means

Generated extension code could bypass website CSP restrictions or make privileged network requests if implemented too broadly.

Why it was flagged

The documentation teaches extension patterns for bypassing page CSP via a service worker relay. It also includes allowlist and sender-validation guidance, so this is purpose-aligned but security-sensitive.

Skill content
The relay pattern (CSP bypass) ... Content script sends a request to the service worker, which performs the fetch and returns the result.
Recommendation

Use narrow host permissions, validate message senders and URLs, and avoid generic fetch relays that accept arbitrary destinations.

What this means

If copied into an extension without pruning, the extension may request access to sensitive browser/account data or many websites.

Why it was flagged

The reference lists sensitive Chrome extension permissions, including OAuth identity, cookies, tab metadata, and broad optional host access. These are examples, not hidden skill requirements.

Skill content
"identity", // chrome.identity (OAuth)
    "cookies", // chrome.cookies
    "tabs", // chrome.tabs ...
  "optional_host_permissions": ["https://*/*"]
Recommendation

Only include permissions needed for the specific extension feature, prefer activeTab or optional permissions, and avoid broad all-site access unless clearly necessary.

What this means

An extension built from these patterns could keep injecting scripts on matching sites across browser restarts.

Why it was flagged

The docs explain how to register persistent dynamic content scripts. This is a normal Chrome extension feature, but persistence should be deliberate and removable.

Skill content
Dynamic content scripts persist across browser restarts ... persistAcrossSessions: true
Recommendation

Scope matches narrowly, document persistence to users, and include cleanup or unregister paths for dynamic content scripts.