Skill
Community

wxt-framework-patterns

Install
1
Install the plugin
$
npx claudepluginhub arustydev/agents --plugin browser-extension-dev

Want just this skill?

Then install: npx claudepluginhub u/[userId]/[slug]

Description

Comprehensive WXT browser extension framework patterns, security hardening rules, and cross-browser configuration

Tool Access

This skill uses the workspace's default tool permissions.

Skill Content

WXT Framework Patterns

Comprehensive guide for building cross-browser extensions with WXT, including security hardening, Firefox/Safari specifics, and production patterns.

Overview

WXT is the leading framework for browser extension development, offering:

  • Cross-browser support: Chrome, Firefox, Edge, Safari
  • Manifest agnostic: MV2 and MV3 from single codebase
  • File-based entrypoints: Auto-generated manifest
  • Vite-powered: Fast HMR for all script types
  • Framework agnostic: React, Vue, Svelte, Solid, vanilla

This skill covers:

  • Project structure and entrypoint patterns
  • Configuration and manifest generation
  • Security hardening rules (49 rules)
  • Firefox-specific patterns
  • Safari-specific patterns
  • Testing and debugging

This skill does NOT cover:

  • General JavaScript/TypeScript patterns
  • Specific UI framework implementations
  • Store submission process (see store-submission skill)

Quick Reference

CLI Commands

CommandPurpose
wxtStart dev mode with HMR
wxt buildProduction build
wxt build -b firefoxFirefox-specific build
wxt zipPackage for distribution
wxt prepareGenerate TypeScript types
wxt cleanClean output directories
wxt submitPublish to stores

Entrypoint Types

TypeFileManifest Key
Backgroundentrypoints/background.tsbackground.service_worker
Content Scriptentrypoints/content.tscontent_scripts
Popupentrypoints/popup/action.default_popup
Optionsentrypoints/options/options_page
Side Panelentrypoints/sidepanel/side_panel
Unlistedentrypoints/*.tsNot in manifest

Project Structure

my-extension/
├── entrypoints/
│   ├── background.ts           # Service worker
│   ├── content.ts              # Content script
│   ├── content/                # Multi-file content script
│   │   ├── index.ts
│   │   └── styles.css
│   ├── popup/
│   │   ├── index.html
│   │   ├── main.ts
│   │   └── App.vue
│   ├── options/
│   │   └── index.html
│   └── sidepanel/
│       └── index.html
├── public/
│   └── icon/
│       ├── 16.png
│       ├── 32.png
│       ├── 48.png
│       └── 128.png
├── utils/                      # Shared utilities
├── wxt.config.ts               # WXT configuration
├── tsconfig.json
└── package.json

Entrypoint Patterns

Background Script (Service Worker)

// entrypoints/background.ts
export default defineBackground(() => {
  console.log('Extension loaded', { id: browser.runtime.id });

  // Handle messages from content scripts
  browser.runtime.onMessage.addListener((message, sender, sendResponse) => {
    if (message.type === 'getData') {
      handleGetData(message.payload).then(sendResponse);
      return true; // Keep channel open for async response
    }
  });

  // Use alarms for recurring tasks (MV3 service worker friendly)
  browser.alarms.create('sync', { periodInMinutes: 5 });
  browser.alarms.onAlarm.addListener((alarm) => {
    if (alarm.name === 'sync') {
      performSync();
    }
  });
});

Content Script

// entrypoints/content.ts
export default defineContentScript({
  matches: ['*://*.example.com/*'],
  runAt: 'document_idle',

  main(ctx) {
    console.log('Content script loaded');

    // Use context for lifecycle management
    ctx.onInvalidated(() => {
      console.log('Extension updated/disabled');
      cleanup();
    });

    // Create isolated UI
    const ui = createShadowRootUi(ctx, {
      name: 'my-extension-ui',
      position: 'inline',
      anchor: '#target-element',
      onMount(container) {
        // Mount your UI framework here
        return mount(App, { target: container });
      },
      onRemove(app) {
        app.$destroy();
      },
    });

    ui.mount();
  },
});

Content Script with Main World Access

// entrypoints/content.ts
export default defineContentScript({
  matches: ['*://*.example.com/*'],
  world: 'MAIN', // Access page's JavaScript context

  main() {
    // Can access page's window object
    window.myExtensionApi = {
      getData: () => { /* ... */ }
    };
  },
});

Popup with Framework

<!-- entrypoints/popup/index.html -->
<!DOCTYPE html>
<html>
<head>
  <meta charset="UTF-8">
  <meta name="viewport" content="width=device-width, initial-scale=1.0">
</head>
<body>
  <div id="app"></div>
  <script type="module" src="./main.ts"></script>
</body>
</html>
// entrypoints/popup/main.ts
import { createApp } from 'vue';
import App from './App.vue';
import './style.css';

createApp(App).mount('#app');

Configuration

Basic Configuration

// wxt.config.ts
import { defineConfig } from 'wxt';

export default defineConfig({
  srcDir: 'src',
  entrypointsDir: 'src/entrypoints',
  outDir: 'dist',

  manifest: {
    name: 'My Extension',
    description: 'Extension description',
    version: '1.0.0',
    permissions: ['storage', 'activeTab'],
    host_permissions: ['*://*.example.com/*'],
  },
});

Cross-Browser Configuration

// wxt.config.ts
import { defineConfig } from 'wxt';

export default defineConfig({
  manifest: ({ browser }) => ({
    name: 'My Extension',
    description: 'Cross-browser extension',

    // Browser-specific settings
    ...(browser === 'firefox' && {
      browser_specific_settings: {
        gecko: {
          id: 'my-extension@example.com',
          strict_min_version: '109.0',
          data_collection_permissions: {
            required: [],
            optional: ['technicalAndInteraction'],
          },
        },
      },
    }),

    // Chrome-specific
    ...(browser === 'chrome' && {
      minimum_chrome_version: '116',
    }),
  }),
});

Per-Browser Entrypoint Options

// entrypoints/background.ts
export default defineBackground({
  // Different behavior per browser
  persistent: {
    firefox: true,  // Use persistent background in Firefox
    chrome: false,  // Service worker in Chrome
  },

  main() {
    // ...
  },
});

Security Hardening Rules

Manifest Security (Rules 1-10)

#RuleRationale
1Minimize permissionsRequest only what's needed
2Use optional_permissionsRequest sensitive permissions at runtime
3Scope host_permissionsNarrow to specific domains, never <all_urls>
4Set minimum_chrome_versionEnsure security features are available
5Avoid externally_connectable wildcardsLimit which sites can message extension
6Set strict CSPNo unsafe-eval, no external scripts
7Use web_accessible_resources sparinglyFingerprinting risk
8Never expose source mapsHide implementation details
9Remove debug permissions in productione.g., management, debugger
10Validate manifest with wxt build --analyzeCatch permission bloat

Content Script Security (Rules 11-20)

#RuleRationale
11Use Shadow DOM for injected UIStyle isolation, DOM encapsulation
12Never use innerHTML with untrusted dataXSS prevention
13Validate all messages from pageDon't trust window.postMessage
14Use ContentScriptContext for cleanupPrevent memory leaks
15Avoid storing sensitive data in DOMPage scripts can read it
16Use document_idle over document_startLess intrusive, more stable
17Scope CSS selectors narrowlyAvoid page conflicts
18Never inject into banking/payment pagesHigh-risk surfaces
19Use MutationObserver over pollingPerformance
20Validate URL before injectingPrevent injection on wrong pages

Background Script Security (Rules 21-30)

#RuleRationale
21Persist state to chrome.storageService worker terminates
22Use chrome.alarms over setIntervalSurvives worker restart
23Validate all incoming messagesDon't trust content scripts
24Never store secrets in codeUse secure storage
25Use HTTPS for all fetch requestsData in transit security
26Implement rate limitingPrevent abuse
27Log security eventsAudit trail
28Handle extension update gracefullyReconnect content scripts
29Use webRequest carefullyPerformance impact
30Avoid long-running operationsService worker termination

Storage Security (Rules 31-40)

#RuleRationale
31Use storage.local for sensitive dataNot synced to cloud
32Encrypt sensitive valuesDefense in depth
33Implement storage quotasPrevent unbounded growth
34Validate data before storingType safety
35Use versioned schema migrationsData integrity
36Clear storage on uninstallUser privacy
37Don't store PII without consentGDPR/CCPA compliance
38Use storage.session for temporary dataAuto-cleared
39Implement backup/restoreData recovery
40Audit storage accessSecurity logging

Communication Security (Rules 41-49)

#RuleRationale
41Use runtime.sendMessage over postMessageType-safe, scoped
42Validate sender in message handlersPrevent spoofing
43Never pass functions in messagesSerialization issues
44Chunk large data transfersMemory efficiency
45Use typed message protocolsMaintainability
46Implement request timeoutsPrevent hanging
47Handle disconnection gracefullyTab closed, extension disabled
48Don't expose internal APIs externallyUse separate handlers
49Log and monitor message patternsDetect anomalies

Firefox-Specific Patterns

Required Gecko Settings

// wxt.config.ts
manifest: {
  browser_specific_settings: {
    gecko: {
      // Required for AMO submission
      id: 'my-extension@example.com',

      // Version constraints
      strict_min_version: '109.0',

      // Data collection (required since Nov 2025)
      data_collection_permissions: {
        required: [],
        optional: ['technicalAndInteraction'],
      },
    },

    // Firefox for Android
    gecko_android: {
      strict_min_version: '120.0',
    },
  },
}

Firefox MV3 Differences

FeatureChrome MV3Firefox MV3
BackgroundService worker onlyEvent page supported
PersistentNoOptional with persistent: true
browser APIPromisified polyfill neededNative promises
DNRFull supportPartial support
Side PanelSupportedNot supported

Firefox-Specific Build

# Build for Firefox only
wxt build -b firefox

# Build MV2 for Firefox (if needed)
wxt build -b firefox --mv2

Handling Firefox Differences

// utils/browser-detect.ts
export const isFirefox = navigator.userAgent.includes('Firefox');

// entrypoints/background.ts
export default defineBackground({
  persistent: isFirefox, // Keep background alive in Firefox

  main() {
    if (isFirefox) {
      // Firefox-specific initialization
    }
  },
});

Safari-Specific Patterns

Xcode Project Requirements

Safari extensions require an Xcode host app:

# Convert existing extension to Safari
xcrun safari-web-extension-converter /path/to/extension \
  --project-location /path/to/output \
  --app-name "My Extension" \
  --bundle-identifier com.example.myextension

Privacy Manifest (Required)

Every Safari extension host app needs PrivacyInfo.xcprivacy:

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
  <key>NSPrivacyTracking</key>
  <false/>
  <key>NSPrivacyTrackingDomains</key>
  <array/>
  <key>NSPrivacyCollectedDataTypes</key>
  <array/>
  <key>NSPrivacyAccessedAPITypes</key>
  <array/>
</dict>
</plist>

Safari Limitations

FeatureStatusWorkaround
Side PanelNot supportedUse popup
declarativeNetRequestLimitedUse webRequest
offscreen APINot supportedUse content script
Persistent backgroundNot supportedState persistence
chrome.scripting.executeScriptLimitedDeclare in manifest

Safari Build Workflow

# 1. Build extension
wxt build -b safari

# 2. Convert to Xcode project
xcrun safari-web-extension-converter dist/safari-mv3 \
  --project-location safari-app

# 3. Open in Xcode
open safari-app/MyExtension.xcodeproj

# 4. Add PrivacyInfo.xcprivacy to host app target

# 5. Archive and submit to App Store

TestFlight Distribution

As of 2025, Safari extensions can be submitted as ZIP files to App Store Connect for TestFlight testing without needing Xcode locally.

Storage Patterns

Using WXT Storage Utility

// utils/storage.ts
import { storage } from 'wxt/storage';

// Define typed storage items
export const userSettings = storage.defineItem<{
  theme: 'light' | 'dark';
  notifications: boolean;
}>('local:settings', {
  defaultValue: {
    theme: 'light',
    notifications: true,
  },
});

export const sessionData = storage.defineItem<string[]>(
  'session:recentTabs',
  { defaultValue: [] }
);

// Usage
const settings = await userSettings.getValue();
await userSettings.setValue({ ...settings, theme: 'dark' });

// Watch for changes
userSettings.watch((newValue, oldValue) => {
  console.log('Settings changed:', newValue);
});

Storage Migrations

// utils/storage.ts
import { storage } from 'wxt/storage';

export const userPrefs = storage.defineItem('local:prefs', {
  defaultValue: { version: 2, theme: 'system' },

  migrations: [
    // v1 -> v2: renamed 'darkMode' to 'theme'
    {
      version: 2,
      migrate(oldValue: { darkMode?: boolean }) {
        return {
          version: 2,
          theme: oldValue.darkMode ? 'dark' : 'light',
        };
      },
    },
  ],
});

Testing Patterns

Unit Testing with Vitest

// tests/background.test.ts
import { describe, it, expect, vi, beforeEach } from 'vitest';
import { fakeBrowser } from 'wxt/testing';

describe('background script', () => {
  beforeEach(() => {
    fakeBrowser.reset();
  });

  it('handles getData message', async () => {
    // Setup fake response
    fakeBrowser.storage.local.get.mockResolvedValue({ data: 'test' });

    // Import and run background script
    await import('../entrypoints/background');

    // Simulate message
    const [listener] = fakeBrowser.runtime.onMessage.addListener.mock.calls[0];
    const response = await new Promise((resolve) => {
      listener({ type: 'getData' }, {}, resolve);
    });

    expect(response).toEqual({ data: 'test' });
  });
});

E2E Testing

// tests/e2e/extension.test.ts
import { test, expect, chromium } from '@playwright/test';
import path from 'path';

test('popup shows correct UI', async () => {
  const extensionPath = path.join(__dirname, '../../dist/chrome-mv3');

  const context = await chromium.launchPersistentContext('', {
    headless: false,
    args: [
      `--disable-extensions-except=${extensionPath}`,
      `--load-extension=${extensionPath}`,
    ],
  });

  // Get extension ID
  const [background] = context.serviceWorkers();
  const extensionId = background.url().split('/')[2];

  // Open popup
  const popup = await context.newPage();
  await popup.goto(`chrome-extension://${extensionId}/popup.html`);

  await expect(popup.locator('h1')).toHaveText('My Extension');
});

Production Checklist

Before Build

  • Remove console.log statements
  • Set production environment variables
  • Verify all permissions are necessary
  • Test on all target browsers
  • Run security audit (npm audit)
  • Check bundle size (wxt build --analyze)

Manifest Validation

  • Extension name and description are accurate
  • Icons in all required sizes (16, 32, 48, 128)
  • Version follows semver
  • Gecko ID set for Firefox
  • Privacy manifest for Safari
  • CSP is strict (no unsafe-eval)

Cross-Browser Build

# Build all browsers
wxt build -b chrome
wxt build -b firefox
wxt build -b safari
wxt build -b edge

# Package for submission
wxt zip -b chrome
wxt zip -b firefox

References

Stats
Stars6
Forks2
Last CommitMar 18, 2026

Similar Skills