“…Existing solutions to prevent malicious extensions generally involve changing the browser's internal design [4], [5], [6], strengthening the vetting process of repositories [2], [7], [8], [9], [10], asking users to install yet another (trusted) extension that detects malicious behaviour of other extensions [11], [12] or requiring an external hardware device (e.g., Cronto) that performs out-of-band transaction verification.…”