Firefox currently treats extension permissions as binary โ an extension either has a permission or it doesn't. There is no dynamic, real-time trust scoring system that reflects how an extension actually behaves at runtime versus what it declared at install time.
The existing Quarantined Domains feature โ introduced in Firefox 115 โ is a great foundation, but it has a critical scalability ceiling: Mozilla must manually curate every domain on the list. Currently only 6 domains are protected. The world has millions of high-value targets.
A lightweight, fully on-device, privacy-preserving behavioral analysis engine that continuously scores each installed extension based on runtime behavior โ not just declared permissions at install time.
At install time, each extension receives an initial trust score computed from:
A sandboxed observer silently monitors extension activity patterns and flags deviations from declared intent:
If runtime behavior deviates significantly from declared intent, the trust score adjusts automatically and instantly.
A simple 0โ100 trust score per extension, visible directly inside about:addons:
One-click drill-down shows exactly which behaviors triggered the score change โ explained in plain language, not raw technical logs.
Extensions that fall below a user-configurable trust threshold are automatically quarantined from high-value domains โ banking, healthcare, government โ without requiring Mozilla to manually curate thousands of domain entries.
This directly solves the scalability problem of the current extensions.quarantinedDomains implementation.
All behavioral scoring happens locally on the user's machine. No behavioral data leaves the browser. Users may optionally contribute anonymized anomaly signals to a community threat feed โ strictly opt-in.
The current permission model was designed for a simpler web. Modern malicious extensions are sophisticated โ an attacker can request minimal permissions at install time and activate harmful behavior weeks later after building user trust. Static permission review at AMO cannot catch post-activation behavioral changes.
AETS closes that gap โ dynamically, privately, and without user friction.
Phase Scope User Impact
| Phase 1 | Passive observer โ silent data collection, score computed locally | None |
| Phase 2 | Trust dashboard UI inside about:addons | Informational only |
| Phase 3 | Quarantine integration + user-configurable thresholds | Active protection |
| Phase 4 | Optional community anomaly feed (opt-in) | Collective defense |
Chrome's Enhanced Safe Browsing touches on extension risk assessment but is cloud-dependent, opaque to users, and not privacy-preserving by design.
No browser currently implements a fully on-device, privacy-preserving, real-time behavioral trust engine with a transparent user-visible scoring system. This would be a Firefox-first feature and a meaningful market differentiator โ especially for privacy-conscious users who choose Firefox precisely because they don't want cloud-based behavioral surveillance.
This idea builds directly on Firefox's existing Quarantined Domains infrastructure and takes it to its logical, scalable conclusion โ protecting every user, on every sensitive site, automatically.