Oldytplayer Youtube Old P Chrome extension icon

Oldytplayer Youtube Old P

✨ AI-Powered 🔍 Security Report Available
👥 2K+ users
📦 v0.4
💾 3.55MiB
📅 2026-02-01
View on Chrome Web Store

Chrome will indicate if you already have this installed.

Overview

Take control of YouTube and bring back the classic player.

OldYTPlayer restores YouTube’s pre-2025 video player and adds a handful of optional, privacy-friendly tweaks. If you prefer the familiar layout with fewer distractions—but still want modern conveniences like community dislikes and SponsorBlock, this extension is for you.

------------------------------

What does OldYTPlayer do?

Restore the Old Player
• Reverts the YouTube player to its pre-2025 look
• Hides the new fullscreen “grid” and quick controls
• Keeps the classic style consistent

Optional Tweaks
• Return YouTube Dislike integration
• SponsorBlock segment skipping
• Classic like/dislike icons and more

Easy Controls
• Popup master enable/disable
• “Only Revert Player” quick action
• Hide/Unhide the OldYTPlayer settings entry

------------------------------

Key Features

Player and UI
• Revert Old YouTube Player (pre-2025 UI)
• Hide fullscreen “More videos” grid and quick-action overlays
• Classic like/dislike buttons

Tweaks and Cleanup
• Remove AI Summary and “Ask AI”
• Hide Shorts across home/search/sidebar/related
• Hide sponsored panels, overlays, merch and promos
• Hide Share/Thanks/Clip buttons

Integrations
• Skip sponsored segments with SponsorBlock
• Show community dislike counts via Return YouTube Dislike

...and much more, all togge-able!

---------------------------

OldYoutubePlayer is a third-party extension and is not affiliated with YouTube.
YouTube is a trademark of Google LLC. Use of this trademark is subject to Google Permissions.

Tags

Make Chrome Yours/functionality social-media video make chrome yours/functionality

Privacy Practices

Not being sold to third parties, outside of the approved use cases
Not being used or transferred for purposes that are unrelated to the item's core functionality
Not being used or transferred to determine creditworthiness or for lending purposes
v0.4 Info Scanned Mar 11, 2026

Security Analysis — Oldytplayer Youtube Old P

Analyzed v0.4 · Mar 11, 2026 · 5 JS files · 147 KB scanned

Permissions

storage tabs scripting https://www.youtube.com/* https://m.youtube.com/*

Code Patterns Detected

innerHTML assignment — potential XSS vector Uses Fetch API Creates script elements dynamically Captures keystrokes Monitors storage changes Uses postMessage for cross-origin comms Sets up event listeners

External Connections

files.catbox.moe iili.io www.w3.org api.sponsor.ajay.app returnyoutubedislikeapi.com fonts.googleapis.com

Package Contents 17 files · 3.7MB

📁_metadata3KB
{}verified_contents.json3KB
📁images3.5MB
🖼logo.png1.3MB
🖼logoold.png960KB
🖼popup_preview.png403KB
🖼yt_settings_preview.png966KB
📄LICENSE1KB
📄README.md4KB
📜background.js1KB
📜content.js5KB
📜inpage.js122KBlarge
{}manifest.json1KB
🎨popup.css10KB
🌐popup.html5KB
📜popup.js13KB
🎨welcome.css9KB
🌐welcome.html14KB
📜welcome.js6KB

What This Extension Does

Oldytplayer Youtube Old P is a browser extension designed to restore YouTube's pre-2025 player interface, re-enable dislikes, and integrate third-party tools like SponsorBlock. It operates by injecting content scripts into YouTube pages to modify the DOM and intercept user interactions. While it serves a specific nostalgia and utility purpose for power users, its broad access to YouTube data and dynamic script creation warrants careful review.

Permissions Explained

  • storageexpected: Allows the extension to save your settings (like which UI tweaks you want) and remember them between sessions.
    Technical: Accesses chrome.storage.local or Session Storage. This is a standard API for persisting configuration data locally on the user's device without network transmission.
  • tabsexpected: Enables the extension to detect when you are on YouTube and show its popup controls or inject features into the correct page.
    Technical: Accesses chrome.tabs API to read tab metadata (title, URL, active status). This is necessary for context-aware functionality but does not inherently expose content unless combined with other permissions.
  • scriptingexpected: Permits the extension to run code on YouTube pages to modify the video player and UI elements.
    Technical: Accesses chrome.scripting API (formerly webRequest/onInstalled). This allows injecting content scripts into specific domains. It grants the ability to read/write DOM, execute JS, and intercept network requests within the scope of the granted host permissions.
  • https://www.youtube.com/*expected: Grants full access to read and modify any content on YouTube pages to restore old UI elements.
    Technical: Host permission allowing chrome.webNavigation, chrome.tabs.insertCSS, and content script injection. This exposes the extension to all data on the page (comments, watch history, personal playlists). If compromised, an attacker could harvest this data or inject malicious scripts into your YouTube session. ⚠ 1
  • https://m.youtube.com/*expected: Grants full access to read and modify any content on the mobile version of YouTube pages.
    Technical: Host permission for mobile subdomain. Similar risk profile to the desktop version, allowing DOM manipulation and data access on responsive layouts. ⚠ 1

Your Data

The extension accesses your YouTube watch history, comments, video titles, and UI elements to modify them. It sends requests to third-party APIs for features like SponsorBlock and dislike counts.

Technical Details

Outbound connections detected to: files.catbox.moe (file hosting), iili.io (image proxy), www.w3.org (standards), api.sponsor.ajay.app (SponsorBlock API), returnyoutubedislikeapi.com (dislikes API). These requests likely transmit cookies and session tokens if not strictly filtered, though they are standard for functionality. No evidence of keystroke logging in the provided network list.

Code Findings

Dynamic Script Element CreationHigh

The extension creates new script tags on your computer. While often used to load necessary libraries, this technique can be abused by malware to download and execute hidden code without your knowledge.

Technical: Code pattern: document.createElement('script') followed by src assignment and .click() or .appendChild(). Risk vector: If the extension is compromised or if a malicious actor gains control of the extension's update mechanism, they could inject arbitrary scripts that steal cookies or hijack the session. This bypasses some CSP protections.

💡 Commonly used to load external libraries (like jQuery) or dynamically fetch configuration files from CDNs when the build process cannot bundle them.

Potential XSS Vector via innerHTMLMedium

The extension uses a method to insert content that could theoretically allow malicious code to run if the source of that content is not strictly validated.

Technical: Code pattern: element.innerHTML = user_input. Risk vector: If the extension fetches data from an untrusted source (like a third-party API) and blindly assigns it to innerHTML, an attacker could inject HTML/JS payloads. This is mitigated if the input is sanitized or escaped before assignment.

💡 Used for rendering user-generated content or dynamic UI components. Standard practice requires strict sanitization of all inputs.

Keystroke Capture CapabilityCritical

The analysis indicates the extension has the capability to capture keystrokes. This is a severe privacy risk as it could record passwords, search queries, or private messages typed on YouTube.

Technical: Code pattern: Event listener for 'keydown' or 'keypress' capturing event.key/value and storing/transmitting data. Risk vector: If this code executes in the context of the extension, it can capture input from any focused element within the scope of its permissions. This is a red flag regardless of whether it is currently active.

💡 Rarely used legitimately in UI restoration tools unless specifically for accessibility testing or password manager integration (which would require explicit user consent and secure storage).

Missing Content Security PolicyMedium

The extension does not enforce strict security rules on which scripts can run. This makes it easier for vulnerabilities to be exploited.

Technical: Manifest or background script lacks 'Content-Security-Policy' header configuration. Risk vector: Without a CSP, the browser allows any script loaded by the extension to execute, increasing the attack surface if a dependency is compromised.

💡 Some simple extensions omit CSP for ease of development, but it is a best practice for security-hardened extensions.

Cross-Origin CommunicationInfo

The extension talks to other websites using a secure messaging system. This is generally safe but requires trust in the receiving parties.

Technical: Code pattern: window.postMessage(). Risk vector: If the extension sends data to an untrusted domain via postMessage, that domain could intercept it. However, this is standard for integrating with services like SponsorBlock.

💡 Standard mechanism for extensions to communicate with external APIs or other browser contexts.

Bottom Line

Oldytplayer Youtube Old P provides useful functionality for restoring YouTube's classic interface but presents significant security concerns. The combination of broad host permissions on YouTube, the creation of dynamic scripts, and the critical finding regarding potential keystroke capture suggests this extension should be used with caution. Users are advised to avoid entering sensitive information (passwords, credit cards) while the extension is active and consider disabling it if they prioritize strict privacy over UI customization.

The easiest way to access the Borderless Internet, Hola VPN gets you Access to the global online content you want!
Make Chrome Yours/functionality
Speed up, slow down, advance and rewind HTML5 audio/video with shortcuts
Make Chrome Yours/functionality
Skip sponsorships, subscription begging and more on YouTube videos. Report sponsors on videos you watch to save others' …
Make Chrome Yours/functionality