Someone pointed me to this paper:
http://www.cse.chalmers.se/research/group/security/publications/2017/extensions/codaspy-17-full.pdf
ABSTRACT
Browser  extensions  provide  a  powerful  platform  to  enrich
browsing  experience.  At  the  same  time,  they  raise  impor-
tant security questions. From the point of view of a website,
some browser extensions are invasive, removing intended fea-
tures and adding unintended ones, e.g. extensions that hi-
jack Facebook likes. Conversely, from the point of view of
extensions, some websites are invasive, e.g. websites that by-
pass ad blockers. Motivated by security goals at clash, this
paper explores browser extension discovery, through a non-
behavioral technique, based on detecting extensions’ web ac-
cessible  resources.  We  report  on  an  empirical  study  with
free  Chrome  and  Firefox  extensions,  being  able  to  detect
over 50% of the top 1,000 free Chrome extensions, including
popular security- and privacy-critical extensions such as Ad-
Block, LastPass, Avast Online Security, and Ghostery. We
also conduct an empirical study of non-behavioral extension
detection on the Alexa top 100,000 websites. We present the
dual  measures  of  making  extension  detection  easier  in  the
interest  of  websites  and  making  extension  detection  more
difficult in the interest of extensions. Finally, we discuss a
browser  architecture  that  allows  a  user  to  take  control  in
arbitrating the conflicting security goals.
The new version of our verification extension should not be detectable
using this technique.
Uzair: do you want to look into this as you're in the process of
rewriting a good share of the code of our extension?