All add-ons are subject to these policies, regardless of how they are distributed. Add-ons that do not comply with these policies may be subject to rejection or disabling by Mozilla.
Surprises can be appropriate in many situations, but they are not welcome when user security, privacy and control are at stake. It is extremely important to be as transparent as possible when submitting an add-on. Users should be able to easily discern what the functionality of your add-on is and not be presented with unexpected user experiences after installing it.
“Unexpected” features are those that are unrelated to the add-on’s primary function, and are not likely from the add-on name or description to be expected by a user installing that add-on.
Should an add-on include any unexpected feature that falls into one of the following categories:
- Potentially compromises user privacy or security (like sending data to third parties)
- Changes default settings like the new tab page, homepage or search engine
- Makes unexpected changes to the browser or web content
- Includes features or functionality not related to the add-on’s core function(s)
Then the “unexpected” feature(s) must adhere to all of the following requirements:
- The add-on description must clearly state what changes the add-on makes.
- All changes must be “opt-in”, meaning the user has to take non-default action to enact the change. Changes that prompt users via the permissions system don’t require an additional opt-in.
- The opt-in interface must clearly state the name of the add-on requesting the change.
Add-ons that make use of Mozilla trademarks must comply with the Mozilla Trademark Policy. If the add-on uses “Firefox” in its name, the naming standard the add-on is expected to follow is “<Add-on name> for Firefox”.
In addition, add-ons listed on addons.mozilla.org (AMO) must adhere to the following policies:
- All add-ons submitted for listing on AMO are subject to Mozilla’s Conditions of Use.
- Add-ons must disclose when payment is required to enable any functionality.
- Any add-ons, or add-on content, hosted on Mozilla site(s) must conform to the laws of the United States.
- The add-on listing should have an easy-to-read description about everything it does, and any information it collects. Please consult our best practices guide for creating an appealing listing.
- Add-ons that are intended for internal or private use, or for distribution testing may not be listed on AMO. Such add-ons may be uploaded for self-distribution instead.
- If the add-on is a fork of another add-on, the name must clearly distinguish it from the original and provide a significant difference in functionality and/or code.
Add-ons must function only as described, and should provide an appealing user experience. Based on the description of the add-on, a user must be able to understand and use the add-on’s features without requiring expert knowledge. Tips on how to create a good user experience for your add-on can be found here.
During review, the add-on undergoes basic testing in addition to code review. To facilitate the functional testing, the add-on author must provide testing information and, if applicable, testing credentials required to use the add-on if an account is needed for any part of the add-on’s functionality.
Issues brought up during review must be addressed using best efforts. If corrections have been requested, the new version should not contain unrelated changes, as this complicates the review process and can lead to further rejections.
Source Code Submission
Add-ons may contain transpiled, obfuscated, minified or otherwise machine-generated code, but Mozilla needs to review a copy of the human-readable source code. The author must provide this information to Mozilla during submission as well as instructions on how to reproduce the build.
The provided source code will be reviewed by an administrator and will not be redistributed in any way. The code will only be used for the purpose of reviewing the add-on. Failure to provide this information will result in rejection.
Please read our Source Code Submission guidelines to avoid unexpected rejections.
In general, developers are free to maintain their add-ons in the manner they choose. However, in order to maintain appropriate data security and effectively review code, we do have certain technical requirements that all add-ons must meet. In particular, potentially dangerous APIs may only be used in ways that are demonstrably safe, and code within add-ons that cannot be verified as behaving safely and correctly may need to be refactored.
While any code, method or practice in a submitted add-on is subject to review and rejection, the following requirements are of particular importance:
- Add-ons must only request those permissions that are necessary for function
- Add-ons must be self-contained and not load remote code for execution
- Add-ons must use encrypted channels for sending sensitive user data
- Add-ons should avoid including duplicate or unnecessary files
- Add-on code must be written in a way that is reviewable and understandable. Reviewers may ask you to refactor parts of the code if it is not reviewable.
- Add-ons must not negatively impact the performance or stability of Firefox.
- Only release versions of third-party libraries and/or frameworks may be included with an add-on. Modifications to these libraries/frameworks are not permitted.
Please read our third party library guidelines to avoid unexpected rejections.
Data Disclosure, Collection and Management
User data includes all information the add-on collects, regardless of the manner. It can be personal data actively provided by the user (such as a name or email address), technical data (such as operating system, build ID, version numbers, crash reports, activation, updates), and interaction or activity data (add-on activity data, visited URLs, console logs), including interactions with Firefox.
- be specific and exclusive to the add-on,
- clearly describe the purpose of the data collection,
- set forth the exact data to be collected,
- address the add-on’s particular privacy properties.
A summary of this information must be included in the add-on’s listing description. Finally, you and your add-on must also comply with all applicable data privacy laws as well as any other laws that may apply to your specific add-on.
User Interactions & Technical Data
- Users must be provided a clear way to control this data collection. The control mechanism must be shown during the installation process of the add-on.
- Add-ons must only collect information about add-on performance and/or use.
- Collecting ancillary information (e.g. any data not explicitly required for the add-on’s basic functionality) is prohibited.
- Users must be provided an opportunity to refuse the storage of or access to cookies, and must be informed of the consequences of doing so (e.g., without a functional cookie, the add-on may not work).
- Installing cookies that are not explicitly required for the add-on’s functionality is prohibited.
- If you are collecting any personal information, the users must provide affirmative consent (i.e., explicit opt-in from the user). It must be clear to the user that they give consent to the collection of personal data.
- Collecting ancillary personal information (e.g., any data not explicitly required for the add-on’s basic functionality) is prohibited.
- Any transmission of this type of data must use secure, encrypted connections.
Additional Privacy Protocols
- Leaking local or user-sensitive information to websites or other processes (e.g., using native messaging) is prohibited.
- HTTPS must be used for security and privacy-sensitive operations such as transmitting passwords or tokens.
- Browsing data from private browsing sessions must not be stored.
- Identity information must not be leaked to web content in private browsing sessions.
Because add-ons run in an environment with elevated privileges relative to ordinary web pages, they present a very serious set of security considerations. They have the potential to open security holes not only in the add-ons themselves, but also in the browser, in web pages, and, in particularly distressing cases, the entire system the browser is running on.
As a result, we take our security policies very seriously and apply them to all add-ons, whether hosted on AMO or not. We expect all add-ons to be secure and well-maintained in handling both their own data and their user’s data. They must also securely manage all of their interactions with the web, the browser and the operating system.
- Monetization mechanisms must comply with the policies in the Data Disclosure, Collection and Management section. In particular, an add-on must be accompanied with a clear user control mechanism (and opt-in for personal data) presented during the installation or update process of the add-on. Collecting ancillary information for monetization is prohibited.
- An add-on injecting advertising into web page content must clearly identify the injected content as originating from the add-on.
- The inclusion of any cryptocurrency miners or similar functionality in an add-on is prohibited.
- Modifying web content or facilitating redirects to include affiliate promotion tags is not permitted. Conversely, the use of affiliate promotion in user interface elements clearly identified as belonging to the add-on are acceptable.
Compliance & Blocklisting
For add-ons that don’t meet these policies, Mozilla may reject or blocklist affected versions or entire add-ons, depending on the extent of their non-compliance.
Generally, Mozilla will attempt to contact the add-on’s developer(s) and provide a reasonable time frame for the problems to be corrected before a block is deployed. If an add-on is considered malicious or its developers have proven unreachable or unresponsive, or in case of repeat violations, blocklisting may be immediate.
Mozilla reserves the right to block or delete the developer’s account on addons.mozilla.org, thereby preventing further use of the service.