Actually, NoScript provides options for white listing and plugin behavior in the client preferences.
If you click on the NoScript icon in the browser toolbar, you should see a drop down menu link titled "options". Selecting that will open the NoScript preferences pane, and from there you can configure virtually all aspects of the NoScript behavior. In fact, NoScript even offers a tab called "WhiteList" with many common sites included in the default distribution, such as "google.com", "msn.com", etc. So, you should be able to achieve the desired result from within the plugin settings. My testing was done within FireFox (which is included in the TOR browser bundle), but the same features exist in the Chrome version of the plugin too.
With regard to a more relaxed version of NoScript, you could try Web of Trust. It operates like a community managed blacklist.
Now, on to the broader question. First, NoScript can block a lot more than JavaScript, and a lot of people use it as a whitelist to mitigate all the most common client-side threat vectors, including JavaScript, Flash, Silverlight, Java Applets, etc. From the perspective of anonymity, all of those tools could likely be used to aid in identifying you if the web site you're connecting to was specifically targeting TOR users. Also, JavaScript code can be obfuscated to make it more difficult to identify with a simple text-parsing program.
So, as a general security precaution, NoScript can add a lot of value. If the default settings are too paranoid for you, my suggestion would be to configure the NoScript white list preferences to allow JavaScript and possibly plugin content from trusted sources while privately browsing with TOR. This might take a bit of time to setup, but after you have your most common sites whitelisted it shouldn't be too much of a hassle to maintain. As noted by @Curiousguy below, you could further mitigate your risk of MITM attacks by only white listing HTTPS sites to take advantage of the PKI.