Network Interception Permissions
Flags items that request privileges enabling interception, observation, or modification of network traffic. Such capabilities can be used to monitor user activity, redirect requests, or interfere with external content, increasing the risk of surveillance, content manipulation, or traffic redirection.