cancel
Showing results forย 
Showย ย onlyย  | Search instead forย 
Did you mean:ย 
MaJHi_BHai
Making moves
Status: New idea

๐Ÿง  The Problem with Today's Extension Trust Model

Firefox currently treats extension permissions as binary โ€” an extension either has a permission or it doesn't. There is no dynamic, real-time trust scoring system that reflects how an extension actually behaves at runtime versus what it declared at install time.

The existing Quarantined Domains feature โ€” introduced in Firefox 115 โ€” is a great foundation, but it has a critical scalability ceiling: Mozilla must manually curate every domain on the list. Currently only 6 domains are protected. The world has millions of high-value targets.


๐Ÿ’ก Proposed Solution: Adaptive Extension Trust Scoring (AETS)

A lightweight, fully on-device, privacy-preserving behavioral analysis engine that continuously scores each installed extension based on runtime behavior โ€” not just declared permissions at install time.


โš™๏ธ How It Works

1. Baseline Declaration Score

At install time, each extension receives an initial trust score computed from:

  • Declared permission scope and sensitivity
  • Publisher history and AMO review status
  • Update frequency and changelog transparency
  • User base size and community reports

2. Runtime Behavioral Delta Engine

A sandboxed observer silently monitors extension activity patterns and flags deviations from declared intent:

  • ๐Ÿ” DOM mutation frequency and scope creep
  • ๐ŸŒ Network request patterns โ€” domains, frequency, payload size
  • ๐Ÿšซ Cross-origin resource access attempts
  • ๐Ÿ’พ Background script CPU/memory usage spikes
  • ๐Ÿ“‚ Storage read/write access patterns

If runtime behavior deviates significantly from declared intent, the trust score adjusts automatically and instantly.

3. User-Facing Trust Dashboard

A simple 0โ€“100 trust score per extension, visible directly inside about:addons:

  • ๐ŸŸข 75โ€“100 โ€” Trusted, behaving as declared
  • ๐ŸŸก 40โ€“74 โ€” Review recommended, minor anomalies
  • ๐Ÿ”ด 0โ€“39 โ€” Anomaly detected, user action advised

One-click drill-down shows exactly which behaviors triggered the score change โ€” explained in plain language, not raw technical logs.

4. Quarantine Trigger Integration

Extensions that fall below a user-configurable trust threshold are automatically quarantined from high-value domains โ€” banking, healthcare, government โ€” without requiring Mozilla to manually curate thousands of domain entries.

This directly solves the scalability problem of the current extensions.quarantinedDomains implementation.

5. Zero Telemetry โ€” Fully On-Device

All behavioral scoring happens locally on the user's machine. No behavioral data leaves the browser. Users may optionally contribute anonymized anomaly signals to a community threat feed โ€” strictly opt-in.


๐ŸŽฏ Why This Matters

The current permission model was designed for a simpler web. Modern malicious extensions are sophisticated โ€” an attacker can request minimal permissions at install time and activate harmful behavior weeks later after building user trust. Static permission review at AMO cannot catch post-activation behavioral changes.

AETS closes that gap โ€” dynamically, privately, and without user friction.

๐Ÿ—บ๏ธ Implementation Roadmap

Phase Scope User Impact

Phase 1Passive observer โ€” silent data collection, score computed locallyNone
Phase 2Trust dashboard UI inside about:addonsInformational only
Phase 3Quarantine integration + user-configurable thresholdsActive protection
Phase 4Optional community anomaly feed (opt-in)Collective defense

๐Ÿ”ฌ Prior Art & Differentiation

Chrome's Enhanced Safe Browsing touches on extension risk assessment but is cloud-dependent, opaque to users, and not privacy-preserving by design.

No browser currently implements a fully on-device, privacy-preserving, real-time behavioral trust engine with a transparent user-visible scoring system. This would be a Firefox-first feature and a meaningful market differentiator โ€” especially for privacy-conscious users who choose Firefox precisely because they don't want cloud-based behavioral surveillance.


โœ… Alignment with Mozilla's Core Values

  • ๐Ÿ”’ Privacy โ€” fully on-device, zero telemetry by default
  • ๐Ÿ‘๏ธ Transparency โ€” users see exactly why a score changed
  • ๐ŸŽ›๏ธ User Control โ€” configurable thresholds, opt-in community feed
  • ๐Ÿ›ก๏ธ Security โ€” closes the post-install behavioral attack vector

This idea builds directly on Firefox's existing Quarantined Domains infrastructure and takes it to its logical, scalable conclusion โ€” protecting every user, on every sensitive site, automatically.

1 Comment
Status changed to: New idea
Jon
Community Manager
Community Manager

Thanks for submitting an idea to the Mozilla Connect community! Your idea is now open to votes (aka kudos) and comments.