
ers (Google Inc., 2018). While we have seen some
positive effects of the migration, like one project
adding the support for a new browser and another
project unified code bases, most participants reported
the need to redesign their extensions without a pos-
itive impact on the users, dropped support for some
browsers, or need to maintain separate code bases for
the supported browsers.
Our research evaluates the reasons why webex-
tension developers are hesitant to change. Important
APIs are missing or are not mature and stable enough.
Additionally, Mv3 lacks new features and possibili-
ties, and does not motivate developers to switch to the
new APIs. Cross-platform compatibility is another
observed problem. Projects switch to separate code
bases for Chromium-based browsers or completely
give up support for these browsers.
Although some projects report short migration
time, others observe problems, including uncertain-
ties in the guarantees that content scripts run in time,
lost functionality due to missing APIs, slow and un-
safe means to store state, and bugs. Some types of
webextensions, like proxy managers and page con-
tent sanitizers, are affected less than various blockers,
cookie managers, and authentication tools. Partici-
pants also worried about the implications of storing
confidential information (e.g., cryptographic secrets,
information from private browser tabs) in the webex-
tension storages.
ACKNOWLEDGEMENTS
This project was funded through the NGI0 Entrust
Fund, a fund established by NLnet with financial sup-
port from the European Commission’s Next Genera-
tion Internet program, under the aegis of DG Commu-
nications Networks, Content and Technology under
grant agreement No 101069594 as JShelter Manifest
V3 project. This work was partly supported by the
Brno University of Technology grant FIT-S-23-8209.
REFERENCES
Agarwal, S. (2022). Helping or hindering? How browser
extensions undermine security. In ACM CCS ’22, page
23–37, New York, NY, USA.
Barnett, D. (2021). Chrome users beware: Man-
ifest V3 is deceitful and threatening. https:
//www.eff.org/deeplinks/2021/12/chrome-users-
beware-manifest-v3-deceitful-and-threatening.
Borgolte, K. and Feamster, N. (2020). Understand-
ing the performance costs and benefits of privacy-
focused browser extensions. In ACM WWW ’20, page
2275–2286, New York, NY, USA.
Chen, Q. and Kapravelos, A. (2018). Mystique: Uncovering
information leakage from browser extensions. In ACM
CCS ’18, page 1687–1700, New York, NY, USA.
Chrome-stats.com (2025). Chrome extensions Manifest V3
migration status. https://chrome-stats.com/manifest-
v3-migration, last visit 2025-03-14.
Fass, A., Som
´
e, D. F., Backes, M., and Stock, B. (2021).
Doublex: Statically detecting vulnerable data flows in
browser extensions at scale. In ACM CCS ’21, page
1789–1804, New York, NY, USA.
Google Inc. (2018). Manifest V3. https://docs.google.com/
document/d/1nPu6Wy4LWR66EFLeYInl3NzzhHzc-
qnk4w4PX-0XMw8, DRAFT.
Gulyas, G. G., Some, D. F., Bielova, N., and Castelluccia,
C. (2018). To extend or not to extend: On the unique-
ness of browser extensions and web logins. In ACM
WPES’18, pages 14–27.
Hsu, S., Tran, M., and Fass, A. (2024). What is in the
chrome web store? In ACM ASIA CCS ’24, page
785–798, New York, NY, USA.
Kim, D. (2022). Find great extensions with new Chrome
Web Store badges. https://blog.google/products/
chrome/find-great-extensions-new-chrome-web-
store-badges/.
Miagkov, A., Gillula, J., and Cyphers, B. (2019). Google’s
plans for chrome extensions won’t really help secu-
rity. https://www.eff.org/deeplinks/2019/07/googles-
plans-chrome-extensions-wont-really-help-security.
Michael Schwarz, M. L. and Gruss, D. (2018). Javascript
zero: Real javascript and zero side-channel attacks. In
NDSSS’18.
O’Flaherty, K. (2019). Google confirms timeline for con-
troversial ad blocking plans. https://www.forbes.com/
sites/kateoflahertyuk/2019/06/25/google-confirms-
timeline-for-controversial-ad-blocking-plans/,
Forbes.
Pantelaios, N. and Kapravelos, A. (2024). Work-in-
progress: Manifest V3 unveiled: Navigating the new
era of browser extensions. Preprint at https://arxiv.org/
abs/2404.08310.
Pol
ˇ
c
´
ak, L., Salo
ˇ
n, M., Maone, G., Hranick
´
y, R., and McMa-
hon, M. (2023). JShelter: Give me my browser back.
In SECRYPT’23.
Schaub, F., Marella, A., Kalvani, P., Ur, B., Pan, C., Forney,
E., and Cranor, L. F. (2016). Watching them watch-
ing me: Browser extensions’ impact on user privacy
awareness and concern. In Proceedings 2016 Work-
shop on Usable Security.
Smith, K. L. and Guzik, E. (2022). Developing privacy
extensions: Is it advocacy through the web browser?
Surveillance & Society, 20(1).
Starov, O. and Nikiforakis, N. (2017). Xhound: Quanti-
fying the fingerprintability of browser extensions. In
IEEE SSP’17, pages 941–956.
Teller, D. (2020). Why did mozilla remove xul add-
ons? https://yoric.github.io/post/why-did-mozilla-
remove-xul-addons/.
WEBIST 2025 - 21st International Conference on Web Information Systems and Technologies
26