
You use the dictionaries key in manifest.json.If you use these APIs, you must explicitly set the ID using the browser_specific_settings key. You use WebExtension APIs that use the add-on ID and expect it to be the same from one browser session to the next.You use AMO's API for uploading your add-on, rather than uploading it manually on its page, you must include the add-on's ID in the request.You want a specific ID, rather than one randomly generated when your extension is first signed.You want to install an unsigned add-on from its XPI file, rather than loading it temporarily using about:debugging.Removing your extension from distributionĪll Manifest V3 extensions need an add-on ID in their manifest.json when submitted to AMO.įor Manifest V2 extensions, you need to add an add-on ID when:.Will I ever be able to sell through AMO?.


Such a preemptive approach prevents exploitation of security vulnerabilities (known and unknown!) with no loss of functionality where you need it. It protects your "trust boundaries" against cross-site scripting attacks (XSS), cross-zone DNS rebinding / CSRF attacks (router hacking), and Clickjacking attempts, thanks to its unique ClearClick technology. your banking site), thus mitigating remotely exploitable vulnerabilities, such as Spectre and Meltdown. It allows JavaScript, Flash, and other executable content to run only from trusted domains of your choice (e.g.

Winner of the "PC World - World Class Award" and bundled with the Tor Browser, NoScript gives you the best available protection on the web.
