I've never seen any XSS injection in real life.
Are you really worried about phishing sites and clickbait sites, though? While the AV and the DNS should already block most of those, I still think it's a waste of time (and resources) to add extensions specifically for them. Just look at the URL, man. You are the main source of protection. I'm pretty sure you're not a happy clicker, you're underestimating yourself.
Tell me your browser, AV and DNS can block all the below
- ads & ad trackers
- malicious sites
- analytics (beacons, pixel etc)
- browser fingerprinting e.g. mouse wheel/speed, CPU/GPU etc besides those listed(and protected) in ScriptSafe and Trace.
- social widgets
- microphone hijack
- WebRTC leak
- unwanted cookies (e.g. cookieless cookie (Etags), super HSTS cookies, HTTPS cookie, zombie cookies etc)
- webbugs
- clickbait links
- in-browser cryptojackers
- browser hijackers
- browser lockers
- phishing and online scams
- PUPs, toolbars and pop ups
- overlays
- CSS (Cascading Style Sheets)
- CDNs (Content Delivery Networks)
- redirects
- session replay scripts
- spoofing/randomizing user-agent/timezone/header(etag and referer)/geolocation
- clean URL tracking
- WebGL
- ultrasonic tracking
- browser-based rootkits and browser-based botnets
- DNS rebinding attacks
- JavaScript-based side-channel attacks against leaks from CPU/RAM
- other web annoyances
and if you are not using Chrome/FF see whether your browser has protection against
- CSRF/XSRF (cross-site request forgery)
- Reflective XSS (cross-site scripting).
- Clickjacking (aka UI redressing)
- Punycode