LinkedIn’s platform embeds a JavaScript fingerprinting script that probes authenticated users’ browsers for over 6,236 Chrome extension IDs, linking detected enterprise tool inventories to verified LinkedIn profiles with employer and role data — enabling organizational software stack profiling without meaningful user disclosure (CWE-200, CWE-359, aligned with MITRE ATT&CK T1592.004). No CVE exists; this is a deliberate platform behavior with competitive intelligence and enterprise privacy implications rather than a patchable vulnerability. Security teams should audit enterprise Chrome extension deployments for web_accessible_resources exposure, update their threat model to include platform-level browser fingerprinting as a reconnaissance vector, and brief leadership on the competitive intelligence risk, particularly for organizations in M&A or competitive positioning contexts.