Software

Google taking action against disguised code in Chrome Web Store

Security rules demand more from devs in the New Year


Weary of dealing with malicious Chrome extensions and user complaints, Google is asking developers to lock down their accounts and tightening up security in its Chrome Web Store.

On Monday, the Chocolate Factory announced a handful of changes to reduce the amount of dodgy code in its marketplace and to make the hijacking of developer accounts more challenging.

Last month the Chocolate Factory disabled the inline installation API, by which websites could publish a Chrome extension installation link that redirected users to the Chrome Web Store. Now the search biz continues its clampdown with word that Chrome 70 will allow users to limit permissions beyond the scope sought by extensions during installation.

Starting in Chrome 70, out in beta now and due for stable channel release in mid-October, users will be able to choose to allow extensions to run after requiring a click, on a specific set of sites, or on all sites requested by the code. This capability, designed to reduce the chance an extension could gather unanticipated information, can be accessed via the chrome://extensions page and the extension context menu.

What's more, Google intends to subject extensions to extra scrutiny if they request access to powerful permissions. James Wagner, Chrome Extensions product manager, said in a blog post that Google will watch for extensions that rely on remotely hosted code. He advised developers to scope their extension permissions as narrowly as possible to minimize review time.

No disguises

Google is also banning obfuscated code – code altered to disguise its flow and logic – in Chrome extensions, starting today. The ban takes the form of a Chrome developer content policy that says, "Developers must not obfuscate code or conceal functionality of their extension."

Google actually listens to users, hands back cookies and rethinks Chrome auto sign-in

READ MORE

The readability requirement doesn't extend to minified code, a form of obfuscation designed to compress source code through the shortening of variable and function names and the removal of whitespace, newlines, and comments. Minification makes code less readable, for the sake of smaller files and better performance, but isn't generally an attempt to disguise how it functions.

The company says 70 percent of malicious and policy-violating extensions include code designed to be difficult to read. And it doesn't have the patience to review extension code that's deliberately unfriendly to the eyes. Devs who have Chrome extensions with obfuscated code in release have until New Year's Day to submit a revision.

Come 2019, the Googleplex will require Chrome Web Store developers to use two-step Verification to secure their accounts. The company hopes to make it more difficult for malicious types to hijack accounts associated with popular extensions, a tactic for malware distribution seen elsewhere. This won't do much to prevent devs from selling their accounts to fraudsters, however.

Next year will also see the introduction of a revised spec for extension manifest files, through which devs declare the permissions and resources required by a Chrome extension. Google hasn't yet released details on version 3, but says it aims to narrow the scope of its APIs, make permission control easier for users, and support modern web capabilities like the Service Workers as a background process. ®

Send us news
18 Comments

Online tracking is alive and well in link decoration

The pending death of third-party cookies won't do much for other privacy intrusions

Google's third-party cookie culling to begin in Q1 2024 ... for 1% of Chrome users

And in full swing starting Q3

Judge tosses Sonos's $32.5M patent win over Google with savage slam down

'It is wrong that our system was used to punish an innovator and to enrich a pretender'

What's unconstitutional about Google keyword search warrants? Nothing, says Colorado Supreme Court

Arson case produces a very tricky precedent for anyone who values digital privacy

From chaos to cadence: Celebrating two decades of Microsoft's Patch Tuesday

IT folks look back on 20 years of what is now infosec tradition

Google pays Apple $18B to $20B a year to keep its search in iPhone

Bernstein estimates value of agreement, warns it and similar deals may end if DoJ wins antitrust case

Google offers some copyright indemnity to users of its generative AI services

'If you are challenged, we will assume responsibility'

It's 2023 and Microsoft WordPad can be exploited to hijack vulnerable systems

Happy Halloween! Security bugs under attack squashed, more flaws fixed

Australia threatens X with fine, warns Google, for failure to comply with child abuse handling report regs

Elon Musk's social network provided no response – or junk – to official inquiries about its safety practices

US construction giant unearths concrete evidence of cyberattack

Simpson Manufacturing yanks systems offline, warns of ongoing disruption

HTTP/2 'Rapid Reset' zero-day exploited in biggest DDoS deluge seen yet

Botnet storm drowned last record with 398 million requests per second

Google introduces phone-shaped housing for its AI tech

Pixel 8 and Pixel 8 Pro out, Chrome goliath ups support to seven years