Back to home

How it works

We monitor browser extensions across your fleet and flag the risky ones. Three ways to integrate, same underlying intelligence behind all of them.

Ways to integrate

Available

Browser extension

Team installs the extension via an invite link and gets auto-enrolled into your fleet.

  • One-click enrollment via invite link
  • Continuous scanning on every device
  • Chrome and Chromium-based browsers
  • Rotatable links with instant revocation
Available

REST API

Query our risk intelligence directly. Submit extension IDs, get back scores and findings.

  • Risk scores and detailed findings
  • Procurement and vendor review workflows
  • SIEM / SOAR ingestion
  • OpenAPI spec at /docs/api
Q2 2026

MDM integration

Push the extension silently via your existing device management. No end-user action required.

  • Google Admin Console
  • Microsoft Intune
  • Jamf, Kandji, and other MDM platforms

What we see

The extension is deliberately minimal. It reads three things and leaves everything else on the device.

We read
  • Extension IDs
  • Version numbers
  • Declared permissions
We never touch
  • Browsing history
  • Form data or keystrokes
  • Page content or cookies

Full security posture covers infrastructure, compliance, and disclosure.

Enrollment takes minutes. No credit card.

First scan within two minutes of install.