技能 professional-senior-chrome-extension-architect-developer
🧩

professional-senior-chrome-extension-architect-developer

低風險 🌐 網路存取⚡ 包含腳本📁 檔案系統存取

Build secure Chrome extensions with MV3 architecture

Building Chrome extensions requires understanding service workers, security patterns, and Chrome Web Store compliance. This skill provides architectural guidance, code templates, and security best practices for creating professional extensions with optional AI integration.

支援: Claude Codex Code(CC)
🥉 75 青銅
1

下載技能 ZIP

2

在 Claude 中上傳

前往 設定 → 功能 → 技能 → 上傳技能

3

開啟並開始使用

測試它

正在使用「professional-senior-chrome-extension-architect-developer」。 Create a new Chrome extension that analyzes page SEO and shows a score in a floating button

預期結果:

  • Manifest configuration with permissions: activeTab, scripting, storage, tabs
  • Content script that collects: title, meta description, headings, images, links
  • Service worker with scoring algorithm and OpenAI integration option
  • Popup UI for API key management and initiating analysis
  • Shadow DOM styling for the floating analysis button
  • Security checklist: no eval, API key in session storage, minimal permissions

正在使用「professional-senior-chrome-extension-architect-developer」。 Build a tab counter extension that shows the count in the extension badge

預期結果:

  • Manifest V3 with tabs permission and action configuration
  • Service worker using chrome.tabs.query to count tabs
  • Badge update logic with chrome.action.setBadgeText
  • Event-driven architecture (no polling, uses onCreated/onRemoved listeners)
  • Minimal host permissions (no all_urls needed)

安全審計

低風險
v5 • 1/17/2026

This is a legitimate Chrome extension development skill with minimal risk. It provides architectural guidance, code templates, and security patterns for building Manifest V3 extensions. The static scanner flagged documentation examples and educational content as security issues. The actual implementation demonstrates secure coding patterns: API keys stored in chrome.storage.session (RAM-only), no eval() in runtime code, Shadow DOM for UI isolation, and minimal permissions. The skill explicitly promotes security best practices including no remote code loading, proper consent flows, and CSP compliance.

21
已掃描檔案
2,249
分析行數
4
發現項
5
審計總數
低風險問題 (1)
Broad host permissions for page analysis
The extension requests host permissions http://*/* and https://*/* to analyze page content. This is legitimate for a page analyzer extension. The content script collects only meta tags, headings, links, and images - not sensitive form data or user input.

風險因素

🌐 網路存取 (1)
⚡ 包含腳本 (1)
📁 檔案系統存取 (1)
審計者: claude 查看審計歷史 →

品質評分

73
架構
100
可維護性
87
內容
20
社群
88
安全
83
規範符合性

你能建構什麼

Design new extension architecture

Create a new Chrome extension with proper MV3 structure, security patterns, and AI integration from scratch.

Review extension security

Audit existing extensions for security issues like eval(), remote code, improper token storage, and permission overreach.

Migrate legacy extensions

Convert Manifest V2 extensions to V3 with service worker patterns, declarativeNetRequest, and modern security practices.

試試這些提示

Create basic extension
Create a simple Manifest V3 Chrome extension with a popup that counts open tabs. Include the manifest.json, background service worker, and popup UI with proper permissions.
Add AI analysis
Add OpenAI API integration to my Chrome extension. Store the API key securely in chrome.storage.session. Create a service worker function that sends page content to GPT and displays the AI response in the popup.
Security review
Review my Chrome extension for security issues. Check for: eval() usage, remote script loading, tokens in localStorage, excessive permissions, missing CSP, and Shadow DOM usage. Report findings with fixes.
Production hardening
Prepare my extension for Chrome Web Store submission. Include privacy policy, proper permission justifications, manifest validation, and compliance with CWS policies.

最佳實務

  • Always use chrome.storage.session for API keys and tokens - never localStorage for sensitive data
  • Inject UI elements with Shadow DOM to prevent style conflicts with host page
  • Request minimal permissions and use optional permissions for features that can be enabled later

避免

  • Using eval() or dynamic code execution - violates CSP and creates security vulnerabilities
  • Loading scripts from external CDNs - enables supply chain attacks
  • Storing credentials in localStorage - accessible by any script on the page

常見問題

Which Chrome APIs does this skill cover?
Service workers, content scripts, popup options pages, offscreen documents, chrome.storage, chrome.tabs, chrome.scripting, chrome.offscreen, and chrome.alarms.
What AI integrations are supported?
OpenAI API integration is demonstrated with secure key storage. Local models can be added using WebLLM or similar libraries running in offscreen documents.
Is the generated code Chrome Web Store compliant?
The skill includes compliance checklists and guidelines. However, always verify current CWS policies as they change quarterly.
How are API keys protected?
API keys are stored in chrome.storage.session which keeps data in RAM only. Keys are not persisted across browser restarts.
Why is my extension being blocked by Chrome?
Common issues: remote code loading, excessive permissions, missing permission justifications, or policy-violating features. Review the security checklist.
How does this compare to WXT or Plasmo?
This skill provides fundamental MV3 patterns. WXT and Plasmo are frameworks that abstract these patterns. Understanding the underlying architecture helps debug framework issues.