Tool for eComm merchants to detect, warn and prevent a customer from shopping using a shady coupon browser extension.
- Detects Honey, Klarna, Capital One Shopping & Rakuten 🕵🏼♀️
- Tiny! 3kb minified & gzipped 🐁
- Does not collect any user data 🥦
- Demo video here 🎥
- Inspired by MegaLag's YouTube 🎥
This will automatically detect a coupon extension and show a default warning to the user to disable the extension as shown above). Install this at the very top of the <head> in your webpage to ensure it runs prior to the extension.
jsDelivr package page.
<script src="https://cdn.jsdelivr.net/npm/coupon-shield@latest/dist/auto.min.js"></script><script src="https://cdn.jsdelivr.net/npm/coupon-shield@latest/dist/couponshield.min.js"></script>
<script>
window.couponShield.listen((warn, vendor) => {
// Decide how you want to handle this. Native warn function allows you to tell the user to disable the extension.
// vendor is "honey", "Capital One Shopping", "Rakuten", or "Klarna"
warn("You must disable the Honey extension to continue.");
});
</script>npm install coupon-shieldimport { listen } from "coupon-shield";
listen((warn, vendor) => {
// Decide how you want to handle this. Native warn function allows you to tell the user to disable the extension.
// vendor is "honey", "Capital One Shopping", "Rakuten", or "Klarna"
warn("You must disable the Honey extension to continue.");
});window.couponShield.listen((warn, vendor, el) => {
// removePageElement defaults to true (extension element loaded onto the page is auto-removed).
// Set removePageElement to false if you want to keep the extension element for some reason.
// el is only defined when removePageElement is false.
// vendor is "honey", "Capital One Shopping", "Rakuten", or "Klarna"
}, { removePageElement: false });window.couponShield.listen((warn, vendor) => {
// Stop observing if nothing is detected within 10 seconds.
}, { unbindAfterSeconds: 10 });