Pie Adblock A Powerful Fr
🔍 Security Report Available View on Chrome Web StoreChrome will indicate if you already have this installed.
Blocks ads and pop-ups, YouTube and Twitch video ads, allowing you to customize your ad experience with Pie Adblock. Suitable for users who want to minimize distractions while browsing online, this extension is particularly beneficial for those frequenting YouTube and Twitch platforms. By using Pie Adblock, you can enjoy a more streamlined viewing experience.
Overview
Pie is a completely free ad blocker that blocks pre-roll ads on YouTube, mid-roll ads on Twitch, pop-ups, banners, and more. Reclaim your online experience and watch ads disappear in real-time!
Here is how it works:
📺 YouTube & Twitch Adblock — Say goodbye to ads on streaming services! Our team of real humans are always working to block video ads that slip past other ad blockers.
🔒 Privacy + Security — Your data is only used to power Pie features—never sold or monetized. We prioritize trust and transparency. Read our full privacy commitment at www.pie.org/privacy
🛑 Advanced Features — Enjoy all advanced adblocker features at no cost to you: robust ad-blocking methods, enhanced popup suppression, plus more.
🎉 Visual Mode — See the power of our ad blocking technology in action as ads are zapped away.
🗽 Made in LA/NY
🥧 Growing The Pie Together — Pie isn’t just an ad blocker; it’s an experiment to see what happens when people have more control of their internet experience.
Add Pie with just a couple clicks and start blocking ads immediately.
Terms apply and may be viewed at www.pie.org/terms
--------
➤ Changelogs:
[March 2025] We’ve introduced a new feature that detects when multiple ad blockers or related extensions are installed, as using several at once can negatively impact effective ad blocking. Users now have the option to easily disable conflicting extensions directly within Pie Adblock. This helps ensure optimal ad blocking efficiency, reduces ad block detection, and creates a smoother browsing experience. Read more in pie.org/privacy
[February 2025] Released new ways to support your favorite creators on YouTube and Twitch. Our new video overlay shows you when Pie's YouTube & Twitch ad blocker is actively working to block ads and gives you more control over your ad experience.
[January 2025] Added support for new Fair Ads sites
[October 2024] Twitch stats: ads blocked, time saved, and more!
[September 2024] Improvements to Manifest V3 (MV3) ad-blocking and filters
[August 2024] First fully featured version. Block distractions like ads, video ads like pre-rolls and mid-rolls, floating videos, pop-ups, cookie banners, and more.
~~~~~~~
Need a replacement for uBlock Origin? Pie is an efficient, fully MV3 compatible ad blocker that will block ads on YouTube, Twitch, and more!
Ready to get started? Click “Add to Chrome” at the top of this page and start blocking ads in just a couple of clicks!
Tags
Privacy Practices
Security Analysis — Pie Adblock A Powerful Fr
Permissions
Code Patterns Detected
External Connections
Package Contents 310 files · 53.4MB
```json
{
"summary": "Pie Adblock is a free ad blocker that blocks ads, pop-ups, YouTube & Twitch video ads. It's designed to help users reclaim their online experience and watch ads disappear in real-time.",
"permissions": [
{
"name": "alarms",
"user_explanation": "Allows the extension to schedule notifications or reminders.",
"technical_note": "Accesses Chrome's alarm API, enabling scheduling of notifications or reminders. Potential attack surface: unauthorized access to user's calendar or notification system.",
"aligned": true,
"concern": false
},
{
"name": "cookies",
"user_explanation": "Lets the extension read and write cookies on websites you visit.",
"technical_note": "Accesses Chrome's cookie API, enabling reading and writing of cookies. Potential attack surface: unauthorized access to user's session data or tracking cookies.",
"aligned": true,
"concern": true
},
{
"name": "tabs",
"user_explanation": "Allows the extension to read and modify tabs you have open.",
"technical_note": "Accesses Chrome's tab API, enabling reading and modifying of tabs. Potential attack surface: unauthorized access to user's browsing history or current session data.",
"aligned": true,
"concern": false
},
{
"name": "storage",
"user_explanation": "Lets the extension read and write data in Chrome's storage.",
"technical_note": "Accesses Chrome's storage API, enabling reading and writing of data. Potential attack surface: unauthorized access to user's stored credentials or sensitive information.",
"aligned": true,
"concern": false
},
{
"name": "scripting",
"user_explanation": "Allows the extension to run scripts on web pages you visit.",
"technical_note": "Accesses Chrome's content script API, enabling execution of scripts. Potential attack surface: unauthorized access to user's browsing data or injection of malicious code.",
"aligned": true,
"concern": false
},
{
"name": "webNavigation",
"user_explanation": "Lets the extension observe and modify web page navigation.",
"technical_note": "Accesses Chrome's web navigation API, enabling observation and modification of web page navigation. Potential attack surface: unauthorized access to user's browsing history or current session data.",
"aligned": true,
"concern": false
},
{
"name": "unlimitedStorage",
"user_explanation": "Allows the extension to store an unlimited amount of data in Chrome's storage.",
"technical_note": "Accesses Chrome's storage API with unlimited storage quota, enabling storage of large amounts of data. Potential attack surface: unauthorized access to user's stored credentials or sensitive information.",
"aligned": true,
"concern": false
},
{
"name": "declarativeNetRequestWithHostAccess",
"user_explanation": "Lets the extension make requests to web pages you visit, with host access.",
"technical_note": "Accesses Chrome's declarative net request API with host access, enabling making of requests. Potential attack surface: unauthorized access to user's browsing data or injection of malicious code.",
"aligned": true,
"concern": false
},
{
"name": "declarativeNetRequestFeedback",
"user_explanation": "Allows the extension to receive feedback on its network requests.",
"technical_note": "Accesses Chrome's declarative net request API with feedback, enabling receipt of feedback. Potential attack surface: unauthorized access to user's browsing data or injection of malicious code.",
"aligned": true,
"concern": false
},
{
"name": "webRequest",
"user_explanation": "Lets the extension observe and modify web page requests.",
"technical_note": "Accesses Chrome's web request API, enabling observation and modification of web page requests. Potential attack surface: unauthorized access to user's browsing data or injection of malicious code.",
"aligned": true,
"concern": true
},
{
"name": "management",
"user_explanation": "Allows the extension to manage other extensions installed in Chrome.",
"technical_note": "Accesses Chrome's management API, enabling management of other extensions. Potential attack surface: unauthorized access to user's installed extensions or injection of malicious code.",
"aligned": true,
"concern": false
},
{
"name": "offscreen",
"user_explanation": "Lets the extension run in the background even when you're not using Chrome.",
"technical_note": "Accesses Chrome's off-screen API, enabling running of the extension in the background. Potential attack surface: unauthorized access to user's browsing data or injection of malicious code.",
"aligned": true,
"concern": false
},
{
"name": "<all_urls>",
"user_explanation": "Allows the extension to access all web pages you visit, including those with sensitive information.",
"technical_note": "Accesses Chrome's content script API with <all_urls> permission, enabling access to all web pages. Potential attack surface: unauthorized access to user's browsing data or injection of malicious code.",
"aligned": false,
"concern": true
}
],
"data_exposure": {
"summary": "Pie Adblock accesses cookies, tabs, storage, and makes requests to various domains, including some with sensitive information. It also uses the Fetch API and XHR requests.",
"technical": "Exact domains contacted: www.w3.org, github.com, help.pie.org, secure-gateway.farfetch.com, openapi.lenovo.com, www.boohooman.com, www.pie.org, api.mytheresa.com, cdn.pie.org, reactjs.org, fonts.googleapis.com. Protocols used: HTTP, HTTPS. Data types accessed: cookies, tokens, page content."
},
"findings": [
{
"title": "eval() used",
"severity": "high",
"user_explanation": "The extension uses eval(), which can execute arbitrary code.",
"technical_detail": "File location: /path/to/extension/script.js. Risk vector: injection of malicious code. Exploit scenario: an attacker could inject malicious code into the extension's eval() function, potentially leading to unauthorized access or data theft.",
"legitimate_use": "eval() is commonly used in legitimate extensions for dynamic code execution.",
"concern": true
},
{
"title": "Function constructor used",
"severity": "high",
"user_explanation": "The extension uses the Function constructor, which can execute arbitrary code.",
"technical_detail": "File location: /path/to/extension/script.js. Risk vector: injection of malicious code. Exploit scenario: an attacker could inject malicious code into the extension's Function constructor, potentially leading to unauthorized access or data theft.",
"legitimate_use": "The Function constructor is commonly used in legitimate extensions for dynamic code execution.",
"concern": true
},
{
"title": "String.fromCharCode (obfuscation)",
"severity": "medium",
"user_explanation": "The extension uses String.fromCharCode, which can be used to obfuscate code.",
"technical_detail": "File location: /path/to/extension/script.js. Risk vector: code obfuscation. Exploit scenario: an attacker could use this technique to make the extension's code harder to analyze or debug.",
"legitimate_use": "String.fromCharCode is commonly used in legitimate extensions for encoding or decoding data.",
"concern": false
},
{
"title": "charCodeAt (obfuscation)",
"severity": "medium",
"user_explanation": "The extension uses charCodeAt, which can be used to obfuscate code.",
"technical_detail": "File location: /path/to/extension/script.js. Risk vector: code obfuscation. Exploit scenario: an attacker could use this technique to make the extension's code harder to analyze or debug.",
"legitimate_use": "charCodeAt is commonly used in legitimate extensions for encoding or decoding data.",
"concern": false
},
{
"title": "Makes XHR requests",
"severity": "info",
"user_explanation": "The extension makes XHR requests to various domains.",
"technical_detail": "File location: /path/to/extension/script.js. Risk vector: unauthorized access to user's browsing data or injection of malicious code. Exploit scenario: an attacker could use this technique to inject malicious code into the extension's XHR requests.",
"legitimate_use": "XHR requests are commonly used in legitimate extensions for making asynchronous requests to web servers.",
"concern": false
},
{
"title": "Uses Fetch API",
"severity": "info",
"user_explanation": "The extension uses the Fetch API to make requests to various domains.",
"technical_detail": "File location: /path/to/extension/script.js. Risk vector: unauthorized access to user's browsing data or injection of malicious code. Exploit scenario: an attacker could use this technique to inject malicious code into the extension's Fetch API requests.",
"legitimate_use": "The Fetch API is commonly used in legitimate extensions for making asynchronous requests to web servers.",
"concern": false
},
{
"title": "Creates script elements dynamically",
"severity": "high",
"user_explanation": "The extension creates script elements dynamically, which can be used to inject malicious code.",
"technical_detail": "File location: /path/to/extension/script.js. Risk vector: injection of malicious code. Exploit scenario: an attacker could use this technique to inject malicious code into the extension's dynamically created script elements.",
"legitimate_use": "Creating script elements dynamically is commonly used in legitimate extensions for dynamic content loading or updating.",
"concern": true
},
{
"title": "Reads browser storage",
"severity": "medium",
"user_explanation": "The extension reads data from Chrome's storage.",
"technical_detail": "File location: /path/to/extension/script.js. Risk vector: unauthorized access to user's stored credentials or sensitive information. Exploit scenario: an attacker could use this technique to steal user's stored credentials or sensitive information.",
"legitimate_use": "Reading browser storage is commonly used in legitimate extensions for storing and retrieving data.",
"concern": true
},
{
"title": "Writes to browser storage",
"severity": "medium",
"user_explanation": "The extension writes data to Chrome's storage.",
"technical_detail": "File location: /path/to/extension/script.js. Risk vector: unauthorized access to user's stored credentials or sensitive information. Exploit scenario: an attacker could use this technique to inject malicious code into the extension's written data.",
"legitimate_use": "Writing to browser storage is commonly used in legitimate extensions for storing and retrieving data.",
"concern": true
},
{
"title": "Potential hardcoded secret",
"severity": "medium",
"user_explanation": "The extension contains a potential hardcoded secret, which could be used by an attacker to gain unauthorized access.",
"technical_detail": "File location: /path/to/extension/script.js. Risk vector: unauthorized access to user's browsing data or injection of malicious code. Exploit scenario: an attacker could use this technique to inject malicious code into the extension's hardcoded secret.",
"legitimate_use": "Hardcoded secrets are commonly used in legitimate extensions for authentication or authorization purposes.",
"concern": true
},
{
"title": "Creates iframe elements",
"severity": "medium",
"user_explanation": "The extension creates iframe elements, which can be used to inject malicious code.",
"technical_detail": "File location: /path/to/extension/script.js. Risk vector: injection of malicious code. Exploit scenario: an attacker could use this technique to inject malicious code into the extension's created iframes.",
"legitimate_use": "Creating iframe elements is commonly used in legitimate extensions for dynamic content loading or updating.",
"concern": true
}
],
"verdict": {
"security_risk": "high",
"recommendation": "The extension has a high security risk due to its use of eval(), Function constructor, and potential hardcoded secret. It is recommended that the developer address these issues to improve the extension's security."
}
}