This extension shows concerning patterns that may indicate risky behavior. Proceed with caution.
This extension shows significant risk signals. Review the findings below carefully before installing or continuing to use it.
Based on 56 permissions including high-risk ones, 219 code findings, 5 dangerous combinations.
Extension uses tab tracking APIs (onUpdated/query) and communicates with external servers — potential browsing surveillance.
Extension intercepts network traffic and sends data externally — potential man-in-the-middle behavior.
Extension manages other extensions and executes dynamic code — behavior consistent with malware dropper.
Extension communicates with native apps and executes dynamic code — potential sandbox escape vector.
Extension has access to all sites and captures keyboard input — behavior consistent with a keylogger.
1 library detected
object-src is not set to 'none'. Plugins like Flash can be embedded, which may allow code execution.
Resolved from __MSG_* i18n placeholders:
Name: 1Password – Password Manager
Description: The best way to experience 1Password in your browser. Easily sign in to sites, generate passwords, and store secure information.
JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.
451 indicators of compromise found