Skip to the content.

Security Documentation

Permissions

storage

Content Scripts

Data Privacy

Threat Model

Best Practices