L.S.
While it is one of the best methods for protection developed so far for ordinairy end-users, the insecure state of the Internet and the lack of trust existing (somebody may be watching you right now or dragnet all of your data, like that could be the NSA and other 5-eyes spy agencies : could make script blocking not be full-proof under all known circumstances.
Extensions like NoScript and uMatrix may sometimes give you a false sense of security. An allowed script in from a trusted source could be easily be updated to do something nasty in the coming future.
NoScript will not run any checksums or hashes to detect if the allowed script has been changed, nor if the allowed script running has to be retired or is vulnerable.
That is why your avast forum friend, polonus, whenever in doubt, will always check with retire.insecurity.today/# and https://sritest.io/ or https://observatory.mozilla.org/ etc. (what seems as an appropriate scan action at the time).
In the mean time you may know, what Eddy and Polonus for instance are doing in the virus and worms sector, when the two present scan results of insecure websites.
And there is room for impovement on about 80% of Internet websites generally speaking. (DNS, Cloaking, Inline Scripting, Retirable script libraries, left code, DOM-XSS sources and sinks, certification installed as root on the server, wrong encryption cypher implementation, insertion of malscript, phishing, SRI-hashes not generated, server and nameserver info proliferation, clickjacking and cookie insecurity etc. etc. etc.).
Google code equals spy code, because of the core business, that Corporation is into, so Google Chrome extensions are limited due to the extension API, which could make blocking javascript work out in a way that unstable blocked scripts can get through and inline scripts will not get blocked. This all because Google is also running an ad service, remember. So there is room for justified paranoia (read at www.prism-break.org). Most other browsers searching is enabled by Google, so there isn’t any escape from this situation really, even Duck Duck Go has results improved by Google.
HTTPS Everywhere may give a false sense of security. SSL can be insecure, based on you trusting the website that is using it and the SSL certificate’s authority judgement. Is HSTS implemented, FFS implemented, often best policies are not implemented.
Pageleaf through the HTTPS Everywhere Atlas to get various examples of non-secure sites. I have mentioned insecure example sites regularly,
polonus (volunteer website security analyst and website error-hunter)