<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>浏览器 on Answer</title>
    <link>https://answer.freetools.me/categories/%E6%B5%8F%E8%A7%88%E5%99%A8/</link>
    <description>Recent content in 浏览器 on Answer</description>
    <generator>Hugo -- 0.152.2</generator>
    <language>zh-cn</language>
    <lastBuildDate>Wed, 11 Mar 2026 07:01:12 +0800</lastBuildDate>
    <atom:link href="https://answer.freetools.me/categories/%E6%B5%8F%E8%A7%88%E5%99%A8/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Chrome DevTools Protocol：浏览器调试协议如何成为前端自动化的基础设施</title>
      <link>https://answer.freetools.me/chrome-devtools-protocol%E6%B5%8F%E8%A7%88%E5%99%A8%E8%B0%83%E8%AF%95%E5%8D%8F%E8%AE%AE%E5%A6%82%E4%BD%95%E6%88%90%E4%B8%BA%E5%89%8D%E7%AB%AF%E8%87%AA%E5%8A%A8%E5%8C%96%E7%9A%84%E5%9F%BA%E7%A1%80%E8%AE%BE%E6%96%BD/</link>
      <pubDate>Wed, 11 Mar 2026 07:01:12 +0800</pubDate>
      <guid>https://answer.freetools.me/chrome-devtools-protocol%E6%B5%8F%E8%A7%88%E5%99%A8%E8%B0%83%E8%AF%95%E5%8D%8F%E8%AE%AE%E5%A6%82%E4%BD%95%E6%88%90%E4%B8%BA%E5%89%8D%E7%AB%AF%E8%87%AA%E5%8A%A8%E5%8C%96%E7%9A%84%E5%9F%BA%E7%A1%80%E8%AE%BE%E6%96%BD/</guid>
      <description>Chrome DevTools Protocol：浏览器调试协议如何成为前端自动化的基础设施</description>
    </item>
    <item>
      <title>浏览器扩展的隐形权力：为何第三方代码能读取你的每一次点击</title>
      <link>https://answer.freetools.me/%E6%B5%8F%E8%A7%88%E5%99%A8%E6%89%A9%E5%B1%95%E7%9A%84%E9%9A%90%E5%BD%A2%E6%9D%83%E5%8A%9B%E4%B8%BA%E4%BD%95%E7%AC%AC%E4%B8%89%E6%96%B9%E4%BB%A3%E7%A0%81%E8%83%BD%E8%AF%BB%E5%8F%96%E4%BD%A0%E7%9A%84%E6%AF%8F%E4%B8%80%E6%AC%A1%E7%82%B9%E5%87%BB/</link>
      <pubDate>Wed, 11 Mar 2026 05:35:47 +0800</pubDate>
      <guid>https://answer.freetools.me/%E6%B5%8F%E8%A7%88%E5%99%A8%E6%89%A9%E5%B1%95%E7%9A%84%E9%9A%90%E5%BD%A2%E6%9D%83%E5%8A%9B%E4%B8%BA%E4%BD%95%E7%AC%AC%E4%B8%89%E6%96%B9%E4%BB%A3%E7%A0%81%E8%83%BD%E8%AF%BB%E5%8F%96%E4%BD%A0%E7%9A%84%E6%AF%8F%E4%B8%80%E6%AC%A1%E7%82%B9%E5%87%BB/</guid>
      <description>深入剖析浏览器扩展的安全困境。文章基于 USENIX Security 2025 论文、NDSS 学术论文、OWASP 安全指南等权威信源，系统解析浏览器扩展的六大攻击向量：权限过度申请、DOM 访问与密码窃取、Cookie 劫持与会话盗用、扩展指纹追踪、供应链攻击、以及开发者安全意识的缺失。涵盖 Manifest V3 的安全改进与局限、Google 和 Mozilla 的审查机制漏洞、以及企业级扩展治理方案。</description>
    </item>
  </channel>
</rss>
