Hi everyone,
I’m trying to implement browser-specific logic within my extension to distinguish between standard Google Chrome and other Chromium-based browsers (specifically Comet and Atlas or other Agentic AI browsers).
The Challenge: Since these browsers are built directly on top of Chromium, they seem to prioritize compatibility by masking their identity. I’ve already tested the following with no luck:
navigator.userAgent: It returns a standard Chrome string.
Feature Detection: Basic chrome.* API checks don't show enough variance to reliably fingerprint the specific browser.
Is there a known "under-the-hood" property, a unique chrome.runtime constant, or perhaps a specific behavior in the Rendering Engine that differentiates these distributions from the official Google Chrome build?
Can I identify from the Chrome extension scope on which browser exactly the extension is installed?
Thanks in advance,
Tamar
--
You received this message because you are subscribed to the Google Groups "Chromium Extensions" group.
To unsubscribe from this group and stop receiving emails from it, send an email to chromium-extens...@chromium.org.
To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/chromium-extensions/a55a0e00-ff3a-468f-a4fc-20566213664fn%40chromium.org.
--
You received this message because you are subscribed to the Google Groups "Chromium Extensions" group.
To unsubscribe from this group and stop receiving emails from it, send an email to chromium-extens...@chromium.org.
To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/chromium-extensions/43e11bf0-a286-40c8-b5d7-a7f3e414705en%40chromium.org.
Hi Simeon, thanks for following up!
The problem I'm trying to solve is related to Zero Trust access for sensitive web applications.
Browsers with built-in Agentic AI pose a unique data privacy risk because they can natively read screen context and interact with the DOM autonomously.
I need a way to detect if a user is running an AI-native browser so the extension can block access to specific, highly sensitive domains to prevent potential data leakage to third-party LLMs.
Regards,Thanks PhistucK for the cool idea! I checked and you're right - Comet doesn't send the x-browser-copyright header (though they do send x-client-data).
While it doesn't give me the exact browser name yet, it's a great indicator that it’s Chromium-based rather than a standard/clean browser. Thanks!
To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/chromium-extensions/ab09110e-918a-40fa-9848-d4e6e9e75452n%40chromium.org.