Full privacy scan for every site you visit — one popup, complete picture.
Every website you visit drops cookies, hides tracking pixels, fingerprints your device, buries toxic clauses in its terms, and tags your clicks. Each of these is a separate problem. wearehere scans for all of them at once and gives you a single risk score — so you know what you're walking into before you hand over anything.
No AI, no cloud, no accounts — everything runs locally in your browser.
| What you see | What it means |
|---|---|
| Cookies | How many cookies this site set, which ones are from outside companies, how long the longest one lasts |
| Trackers | Hidden tracking pixels, invisible iframes, silent pings (beacons), and third-party scripts — resolved to company names |
| Fingerprinting | When sites read your device specs (GPU, CPU cores, screen depth, audio hardware) to build a unique ID — no cookies needed |
| Pressure | Dark patterns: fake countdown timers, "Only 2 left!", guilt-trip decline buttons, pre-checked newsletter boxes |
| Terms | Toxic clauses in their privacy policy and terms of service — data selling, surveillance, binding arbitration, no right to delete |
| Stored on you | Tracking IDs and analytics tokens saved in your browser's local storage, categorized by type |
| Link tracking | UTM parameters and redirect wrappers attached to links so they know what you click next |
| Network | Real-time request monitoring — which domains your browser talks to, data broker detection, redirect chains |
| Forms | Which form fields are on the page and whether trackers are active while you type |
Each category contributes to a combined risk score (0–100).
| Score | Badge | Meaning |
|---|---|---|
| 0–15 | Green | Fairly clean. Browse normally. |
| 16–40 | Orange | Typical tracking. Private browsing helps. |
| 41–70 | Red | Significant risks. Avoid sharing personal info. |
| 71–100 | Red | Very invasive. Use tracker blocking or avoid. |
wearehere reuses detection logic from the weare____ suite — same code, not rewritten:
| Detection | Source extension | Version |
|---|---|---|
| ToS scanning | wearetosed scanner.js |
v0.1.0 |
| Fingerprint wrappers | wearewatched inject.js |
v0.1.0 |
| Tracker company map (258 entries) | wearecooked content.js |
v4.0.0 |
| Dark pattern heuristics | weareplayed content.js |
v0.1.0 |
| Categorized storage patterns | weareleaking content.js |
v0.2.0 |
| Tracking params | wearelinked content.js |
v0.3.0 |
| Network domains (454 trackers, 82 brokers) | wearebaked background.js |
v0.5.1 |
| Form field scanning (Method B) | wearesilent content.js |
v0.1.0 |
Click Full Report in the popup to open the unified dashboard with 8 tabs:
- Overview — risk score breakdown, concerns, at-a-glance summary
- Cookies — searchable/sortable cookie table, cookie cleaner (Clean Third-Party / Clean All)
- Network — request categories, domain table, data broker detection, redirect chains
- Trackers — companies grouped by purpose with element counts
- Terms — toxicity score and flagged clauses
- Data — storage categories with key lists, tracked links with highlighted params
- Fingerprinting — technique cards with API calls and plain-language explanations
- Forms — detected fields and tracker presence status
wearehere also ships an MCP server for AI agents. Give it a URL, get back a full privacy audit as structured JSON — same detection logic, headless browser via barebrowse.
{
"mcpServers": {
"wearehere": {
"command": "node",
"args": ["/path/to/wearehere/mcp-server.js"]
}
}
}- Download this repo (Code → Download ZIP) and unzip
- Go to
chrome://extensionsand turn on Developer mode (top right) - Click Load unpacked → select the
chrome-extensionfolder - That's it — browse any site and click the extension icon
- Download this repo (Code → Download ZIP) and unzip
- Go to
about:debugging#/runtime/this-firefox - Click Load Temporary Add-on → pick any file in the
firefox-extensionfolder - That's it — browse any site and click the extension icon
Firefox temporary add-ons reset when you close the browser — just re-load next session.
Privacy tools that show what's happening — no cloud, no accounts, nothing leaves your browser.
| Extension | What it exposes |
|---|---|
| wearecooked | Cookies, tracking pixels, and beacons |
| wearebaked | Network requests, third-party scripts, and data brokers |
| weareleaking | localStorage and sessionStorage tracking data |
| wearelinked | Redirect chains and tracking parameters in links |
| wearewatched | Browser fingerprinting and silent permission access |
| weareplayed | Dark patterns: fake urgency, confirm-shaming, pre-checked boxes |
| wearetosed | Toxic clauses in privacy policies and terms of service |
| wearesilent | Form input exfiltration before you click submit |
| wearehere | All of the above in one scan |
All extensions run entirely on your device and work on Chrome and Firefox.