What is Am I Being Pwned (AIBP)? Features, Pricing & Tutorial (2026)

Dashboard of Am I Being Pwned showing a list of browser extensions leaking private AI chat data.
Am I Being Pwned (AIBP)
A wall of shame for Chrome extensions scraping and exfiltrating AI chat data.
📅 May 11, 2026|AI Research ToolsFree Plan Available

What is Am I Being Pwned (AIBP)?

Am I Being Pwned (AIBP) is a transparency-focused research project that acts as a "wall of shame" for Chrome extensions caught scraping or exfiltrating AI chat data. It uses empirical network traffic analysis to identify browser add-ons that transmit private user prompts and AI responses to remote servers without explicit user awareness.

  • Best For: Privacy-conscious browser users, cybersecurity researchers, and AI enthusiasts.
  • Pricing: Completely free as an open, informational research resource.
  • Category: AI Research Tools
  • Free Option: Yes ✅

The Problem Am I Being Pwned (AIBP) Solves

Modern browser extensions often require broad permissions to function, creating a significant security blind spot. Users frequently install tools for convenience—like theme managers, ad blockers, or site analyzers—without realizing these extensions have the technical capability to monitor and exfiltrate everything happening in their browser tabs, including sensitive AI conversations with platforms like ChatGPT, Claude, and Character AI.

The primary victims of this silent data collection are everyday users who assume that "Featured" or "Verified" badges in the Chrome Web Store imply a high level of security and privacy. In reality, many of these popular extensions are owned by analytics firms or data brokers that profit from scraping user-generated content to train proprietary models or build behavioral profiles.

Am I Being Pwned (AIBP) fixes this information asymmetry by providing a transparent, evidence-based list of extensions that engage in suspicious activity. By distinguishing between "Confirmed" threats and those with the "Capability" to exfiltrate data, the tool empowers users to make informed decisions about their browser security. In this tutorial, you'll learn exactly how to use Am I Being Pwned (AIBP) — step by step.

How to Get Started with Am I Being Pwned (AIBP) in 5 Minutes

  1. Navigate to the official Am I Being Pwned (AIBP) website to access the current "Wall of Shame" report.
  2. Review the table of flagged extensions to see if any of your currently installed add-ons are included.
  3. Check the "Status" column to understand if an extension has been "Confirmed" to scrape data or simply possesses the "Capability" to do so.
  4. Audit your own Chrome browser by visiting chrome://extensions/ to verify which of these tools you have active.
  5. Remove any flagged extensions that you no longer deem necessary or trustworthy to protect your AI conversation history.

How to Use Am I Being Pwned (AIBP): Complete Tutorial

Step 1: Auditing Your Browser Extensions

The first step in using AIBP is to perform a side-by-side comparison between the AIBP list and your installed Chrome extensions. Many users forget which tools they installed months ago, especially if those tools are not part of their daily workflow. By cross-referencing your installed list with the AIBP table, you can identify high-risk software that may be running in the background while you interact with AI chatbots.

💡 Pro Tip: Regularly check your browser extension list once a month to remove dormant tools; every installed extension is an additional surface area for data exfiltration.

Step 2: Understanding Confirmed vs. Capability Threats

AIBP categorizes risks into two specific buckets to help users understand the severity of the threat. "Confirmed" status means the author observed AI chat content actively leaving the browser via network traffic analysis. "Capability" status indicates that the extension contains the remote infrastructure and code paths required for exfiltration, even if that behavior was dormant during the testing period. Both statuses warrant caution, as "Capability" extensions often utilize server-side gating to enable malicious behavior after the extension has been installed and verified.

💡 Pro Tip: If an extension is listed as a "Capability" threat, assume it is only a matter of time before it starts scraping, as remote configuration allows developers to change extension behavior without a user-facing update.

Step 3: Analyzing Data Obfuscation Methods

AIBP highlights how different extensions attempt to hide their tracks. Some developers use advanced obfuscation to prevent security software or manual audits from seeing the data being sent to their servers. When you read the AIBP report, take note of which extensions use obfuscation, as this is a primary indicator of malicious intent. An honest extension has no reason to hide the network traffic it generates, especially when it concerns sensitive user-provided AI prompts.

💡 Pro Tip: Use browser developer tools (Network tab) if you suspect an extension is behaving strangely, and filter for suspicious XHR or WebSocket traffic to see if your prompt data is being sent to third-party endpoints.

Am I Being Pwned (AIBP): Pros & Cons

Pros Cons
Increases transparency regarding browser privacy risks. Not a preventative tool; provides information rather than active blocking.
Identifies risks associated with "Featured" and "Verified" status. Limited strictly to the Chrome extension ecosystem.
Uses empirical network traffic data for objective reporting. Requires manual technical verification of specific extension behavior.

Am I Being Pwned (AIBP) Pricing: Free vs Paid

Am I Being Pwned (AIBP) is a completely free, community-driven resource. There are no paid tiers, subscriptions, or premium features hidden behind a paywall. The project is designed to be an accessible public service for anyone concerned about the privacy implications of their browser environment.

Because the tool is free, you receive full access to all research findings, including the detailed breakdown of the "Wall of Shame." There is no upsell or hidden agenda, which helps maintain the objectivity required for high-quality cybersecurity research.

👉 Check the latest pricing on the official Am I Being Pwned (AIBP) website.

Who is Am I Being Pwned (AIBP) Best For?

For privacy-conscious users: You need a way to verify that the tools you rely on daily are not actively betraying your trust by scraping your private conversations with AI assistants.

For cybersecurity enthusiasts: You gain access to a dataset that tracks how common extensions utilize remote configurations and obfuscation to mask data exfiltration in real-world scenarios.

For AI developers and power users: You need to understand the threat model of browser-based AI interaction to ensure your data stays private and is not being repurposed to train unintended models.

Alternatives to Am I Being Pwned (AIBP)

You can use standard browser security tools like Malwarebytes Browser Guard or uBlock Origin to manage general site security. You could also utilize network traffic sniffers like Wireshark or Fiddler to monitor your own traffic, though these require significant technical expertise. Unlike these generalist tools, Am I Being Pwned (AIBP) is specifically optimized for the unique threat profile of AI prompt exfiltration, making it a more focused resource for your specific concerns.

Final Verdict: Is Am I Being Pwned (AIBP) Worth It?

Am I Being Pwned (AIBP) is an essential resource for anyone using AI tools within a Chrome browser. It provides much-needed visibility into the "black box" of extension permissions and developer practices.

Our Rating: 9/10 — An invaluable, objective tool for maintaining digital privacy in an era of silent data exfiltration.
Visit Am I Being Pwned (AIBP) →Opens official website · No referral link

Frequently Asked Questions

Is Am I Being Pwned (AIBP) free?
Yes, Am I Being Pwned (AIBP) is completely free to use as an open-source, informational research project dedicated to enhancing browser transparency.
How can I check if my browser extensions are leaking AI data using AIBP?
AIBP identifies risky extensions by monitoring network traffic for unauthorized transmission of AI prompt data; users can consult the project's 'wall of shame' to see if their installed tools are flagged for suspicious activity.
Is Am I Being Pwned (AIBP) suitable for non-technical users?
Yes, the tool is designed for both cybersecurity researchers and everyday users who want to identify and remove extensions that compromise their privacy while using AI platforms like ChatGPT and Claude.

🔗 Related AI Tool Tutorials

📋 Disclosure: This is an independent tutorial based on Am I Being Pwned (AIBP)'s publicly available documentation and website content as of May 11, 2026. GitNeural is not affiliated with, sponsored by, or endorsed by Am I Being Pwned (AIBP) or amibeingpwned.com. Pricing and features may have changed — always verify on the official Am I Being Pwned (AIBP) website.