Ublock Origin Lite
🔍 Security Report Available View on Chrome Web StoreChrome will indicate if you already have this installed.
Overview
uBO Lite (uBOL) is an efficient MV3-based content blocker.
The default ruleset corresponds to uBlock Origin's default filterset:
- uBlock Origin's built-in filter lists
- EasyList
- EasyPrivacy
- Peter Lowe’s Ad and tracking server list
You can enable more rulesets by visiting the options page -- click the _Cogs_ icon in the popup panel.
uBOL is entirely declarative, meaning there is no need for a permanent uBOL process for the filtering to occur, and CSS/JS injection-based content filtering is performed reliably by the browser itself rather than by the extension. This means that uBOL itself does not consume CPU/memory resources while content blocking is ongoing -- uBOL's service worker process is required _only_ when you interact with the popup panel or the option pages.
Tags
Privacy Practices
Security Analysis — Ublock Origin Lite
Permissions
Code Patterns Detected
External Connections
Package Contents 967 files · 32MB
What This Extension Does
Ublock Origin Lite (uBO Lite) is a content blocker that efficiently blocks ads, trackers, miners, and more. It's designed for users who want to protect their online privacy and reduce clutter on websites. With over 15 million users, it's one of the most popular extensions in its category.
Permissions Explained
- activeTabexpected: This permission allows uBO Lite to access the current webpage you're viewing.
Technical: Chrome API: chrome.tabs API. Allows extension to read and modify tab content, potentially exposing sensitive information if compromised. - declarativeNetRequestexpected: This permission enables uBO Lite to block network requests based on predefined rules.
Technical: Chrome API: declarativeNetRequest API. Allows extension to intercept and modify network traffic, potentially exposing sensitive information if compromised. - scriptingexpected: This permission allows uBO Lite to execute scripts on web pages.
Technical: Chrome API: chrome.scripting API. Allows extension to inject and execute scripts, potentially exposing sensitive information if compromised. - storageexpected: This permission enables uBO Lite to store data locally on your device.
Technical: Chrome API: chrome.storage API. Allows extension to read and write local storage, potentially exposing sensitive information if compromised. - <all_urls>check this: This permission allows uBO Lite to access all websites you visit.
Technical: Chrome API: chrome.tabs API. Allows extension to read and modify tab content, potentially exposing sensitive information if compromised. ⚠ 1
Your Data
uBO Lite accesses local storage on your device and sends data to various domains, including GitHub, Google, and Mozilla. It also captures keystrokes and can block/modify network requests.
Technical Details
- github.com
- www.gnu.org
- datatracker.ietf.org
- googleads.g.doubleclick.net
- www.w3.org
- developer.mozilla.org
- pagead2.googlesyndication.com
- www.youtube.com
- www.reddit.com
- bugs.webkit.org
- adguard.com
- developers.google.com
- https
- http
- cookies
- tokens
- keystrokes
- page content
Code Findings
This means that uBO Lite can potentially inject malicious code into web pages.
Technical: The extension uses eval() to evaluate JavaScript expressions, which can lead to code injection attacks if not properly sanitized.
💡 Legitimate extensions may use eval() for dynamic code evaluation, but it's essential to ensure proper input validation and sanitization.
This means that uBO Lite can load JavaScript modules dynamically, which may lead to unexpected behavior or security issues.
Technical: The extension uses dynamic imports to load JavaScript modules, which can increase the attack surface if not properly secured.
💡 Legitimate extensions often use dynamic imports for modular code organization and reuse.
This means that uBO Lite uses obfuscated strings, which can make it harder to analyze the extension's behavior.
Technical: The extension uses String.fromCharCode() to encode strings, making it challenging to identify potential security issues.
💡 Legitimate extensions may use obfuscation for code protection or compression.
This means that uBO Lite can potentially capture sensitive information, such as login credentials or credit card numbers.
Technical: The extension uses keyboard event listeners to capture keystrokes, which can lead to sensitive data exposure if not properly secured.
💡 Legitimate extensions may use keyboard event listeners for legitimate purposes, but it's essential to ensure proper input validation and sanitization.
This means that uBO Lite can potentially interfere with website functionality or inject malicious code into all websites you visit.
Technical: The extension uses the <all_urls> permission to access all websites, which increases the attack surface if not properly secured.
💡 Legitimate extensions often require broad permissions for their intended functionality.
This means that uBO Lite can potentially access sensitive information or inject malicious code into various domains.
Technical: The extension uses broad host permissions to access multiple domains, which increases the attack surface if not properly secured.
💡 Legitimate extensions often require broad permissions for their intended functionality.
This means that uBO Lite can potentially intercept and modify network traffic, which may lead to unexpected behavior or security issues.
Technical: The extension uses the declarativeNetRequest permission to block/modify network requests, which increases the attack surface if not properly secured.
💡 Legitimate extensions often use this permission for content blocking or filtering purposes.
This means that uBO Lite may contain hardcoded secrets, which can increase the attack surface if not properly secured.
Technical: The extension uses hardcoded strings or values, which can lead to security issues if not properly sanitized.
💡 Legitimate extensions often use hardcoded values for configuration or initialization purposes.
This means that uBO Lite can potentially inject malicious code into web pages using iframes.
Technical: The extension uses the document.createElement() method to create iframe elements, which can lead to security issues if not properly secured.
💡 Legitimate extensions often use iframes for legitimate purposes, such as content embedding or sandboxing.
This means that uBO Lite can potentially communicate with other domains using the postMessage API, which may lead to security issues if not properly secured.
Technical: The extension uses the postMessage API to send messages between frames or windows, which increases the attack surface if not properly secured.
💡 Legitimate extensions often use postMessage for cross-origin communication purposes.
This means that uBO Lite sets up event listeners to monitor user interactions, which is a normal behavior for extensions.
Technical: The extension uses the addEventListener() method to set up event listeners, which is a common practice in web development.
💡 Legitimate extensions often use event listeners for legitimate purposes, such as monitoring user interactions or responding to events.
While uBO Lite has some concerning findings, it's essential to note that the extension is widely used and trusted by many users. However, we recommend exercising caution when installing extensions with broad permissions or potential security risks. Users should carefully review the extension's behavior and ensure they understand its intended functionality before granting excessive permissions.