Blue Argon rejection fix
Fix Blue Argon Chrome extension rejection errors
Use a local Manifest V3 ZIP scan to find remote hosted code patterns that can trigger Blue Argon Chrome Web Store rejection emails.
Run local ZIP scanGuide
What to check
What Blue Argon usually means
Blue Argon is commonly associated with remotely hosted code in a Chrome extension review. Treat it as a signal to inspect every submitted HTML, JavaScript, worker, and generated bundle for executable code loaded outside the ZIP.
Where to look first
Check popup pages, options pages, service workers, content scripts, dynamic imports, importScripts calls, script src attributes, WebAssembly fetch paths, and dependency output generated by your bundler.
How to verify the fix
Bundle executable code into the submitted extension package, rebuild the production ZIP, run the scanner again, and prepare reviewer notes explaining that remote executable code has been removed.
Checklist
Action checklist
- □ Scan the exact ZIP that was rejected, if available.
- □ Fix every High remote hosted code finding first.
- □ Search bundled vendor files for remote JavaScript and WebAssembly loaders.
- □ Keep remote calls as data/API calls only, not code loaders.
- □ Rebuild the production ZIP after changes.
- □ Scan the rebuilt ZIP before resubmission.
- □ Add concise reviewer notes describing what changed.
Examples
Common cases this page helps with
CDN dependency in popup
A popup loads a library from a CDN. Replace it with a local bundled copy and reference the local file inside the ZIP.
Remote module generated by build output
A development build may leave a remote import in generated files. Scan the production ZIP rather than only searching source files.
Reviewer note draft
We removed runtime loading of executable JavaScript from external origins, bundled the required code into the extension package, and verified the release ZIP with a local static scan.
FAQ
Frequently asked questions
Is Blue Argon always caused by remote hosted code?
It is commonly associated with remote hosted code, but only Chrome Web Store review can determine the exact reason. Use the scanner to find package-level remote executable code signals first.
Can I still call remote APIs after fixing Blue Argon?
Remote API calls can be valid when they return data. Do not fetch and execute remote JavaScript or WebAssembly as extension logic.
Should I appeal or resubmit?
First fix high-risk findings, rebuild the final ZIP, and prepare clear reviewer notes. Then decide whether the store flow requires resubmission or a response to the rejection.
Related guides