Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert
Zero fees, no slippage
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
Slow Fog Cosine: Users need to pay attention to the permission requests of browser extensions and must have isolated thinking

Slow Fog Cosine: Users need to pay attention to the permission requests of browser extensions and must have isolated thinking

Bitget2025/03/14 13:51

Manwu Yuxian posted on the X platform: An extension can do harm, such as stealing cookies from target pages, privacy in localStorage (such as account permission information, private key information), DOM tampering, request hijacking, clipboard content acquisition and so on. This can be done by configuring related permissions in manifest.json. If users don't pay attention to the permission requests of extensions, it could cause trouble. But if an extension wants to directly mess with other extensions like well-known wallet extensions, that's not easy... because they are sandboxed... For example, it's unlikely to directly steal private key/mnemonic phrase-related information stored in a wallet extension. If you're worried about the permission risk of an extension, judging this risk is actually quite easy - after installing the extension you can choose not to use it first; check out its ID; search for its local path on your computer; find the manifest.json file under its root directory and throw the file content directly at AI for a permission risk interpretation. If you have isolation thinking in mind then consider enabling Chrome Profile separately for unfamiliar extensions - at least their potential harm would be controllable and most extensions don't need to be always enabled.

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!