Auditing your browser extensions means reviewing what is installed in Chrome, Edge, Firefox, or Safari, checking each add-on against known-malicious or high-risk lists, and removing anything you do not recognise or no longer need. As of April 2026, browser extensions remain a common route for data collection, excessive permissions, and outright malware, with Google, Mozilla, and independent researchers regularly removing or flagging abusive add-ons. A practical routine takes about 10 minutes: enumerate your extensions, compare them with reputable watchlists such as PrivacyTests and Spicy Chrome Extensions, then revoke anything unfamiliar. Do this every six months.
Step 1: Enumerate everything you have installed
Start with the browser’s extensions page and make a plain list: name, purpose, and whether you installed it yourself. In Chrome and Chromium browsers, that is usually chrome://extensions; in Firefox, about:addons. If you cannot explain what an extension does in one sentence, it is already a candidate for removal.
As reported by Google in recent Chrome Web Store policy updates, extensions are supposed to request only the permissions they need, but store review does not catch everything. As reported by Mozilla in its extension documentation and enforcement notes, add-ons can also be disabled or removed after publication for policy violations. That is the core point of this ritual: approval once is not a lifetime trust signal.
Keep the bar high. Most people do not need 15 extensions. A password manager, one content blocker, and maybe one tab or reading tool is normal. Five or fewer is easier to audit and reduces the chance of overlapping permissions.
Step 2: Check each extension against known-malicious lists
Next, search every installed extension against reputable public lists and research projects. PrivacyTests tracks extension and browser privacy behaviours. Spicy Chrome Extensions documents Chrome extensions flagged for malware, suspicious behaviour, or policy issues. If an extension appears on either list for malware, hidden tracking, or abuse, remove it first and ask questions later.
Do not stop at lists. Open the extension’s store page and check three things: when it was last updated, whether the developer name changed, and whether permissions recently expanded. As reported by academic research on extension ecosystems and by browser vendors’ security teams, malicious takeovers often happen after an extension has already built a user base. A once-benign tool can become risky after a sale or update.
Also check whether the extension has an accessible privacy policy and support page. No documentation is not proof of malice, but it is a bad sign. If the extension edits every page you visit, reads browsing history, or requests access to all websites, the burden of trust should be much higher.
Step 3: Revoke anything you do not recognise
If you do not recognise an extension, disable it immediately. If nothing breaks after a day or two, remove it completely. This is the fastest win in the whole process.
As of April 2026, the most common extension hygiene mistake is keeping old utilities installed “just in case”. That creates standing access to your browsing data for no benefit. Remove duplicate tools, abandoned projects, coupon finders you forgot about, and anything that injects results into shopping or search pages.
If an extension rewrites links or adds referral tags, remove it and clean any shared URLs before sending them on. For share-link hygiene and stripping tracking parameters, use our free tool: https://tool.notrackr.com/.
One final rule: if an extension is genuinely essential, keep a note of why it is installed and what permissions it needs. That makes the next audit faster. The concrete recommendation is simple: schedule this ritual now, then repeat it every six months.