Closed GoogleCodeExporter closed 9 years ago
First of all, there is no such as thing as "spoofed" password requests, because
it's centralized module of Firefox/Thunderburd itself an any extensions can
initialize the request at any moment they choice to, so changing appearance of
the prompt won't do any good.
Mozilla doesn't provide any means of trace where the request initialized from,
therefore I don't see any ways to protect from malicious extension, other then
follow simple commons sense:
1) only install extension from AMO website (http://addons.mozilla.org)
2) don't trust extensions that were never fully reviewed on AMO (these that
have yellow buttons)
Original comment by van...@gmail.com
on 12 Apr 2014 at 1:05
Original issue reported on code.google.com by
fox_wtsu...@Kurzepost.de
on 11 Apr 2014 at 7:10