Adding Furigana Function - Sateraito OfficeSecurity Analysis

Chromev1.0.0.3MV3February 18, 2026 at 11:41 AM
Use with caution

This extension requests significant permissions. It has 1M+ users, but review the findings below.

4.6MEDIUM
4.6 MEDIUMRaw: 5.1

This extension shows some risk signals that are common in legitimate extensions but worth reviewing. Check the details below.

Based on 5 permissions including high-risk ones, 48 code findings.

Trust Signals(3.0/10)

Users
1.0M
Rating
4.4(18 reviews)
Permissions
7.0/10
Code
7.3/10
Combinations
0.0/10
Manifest/CSP
3.1/10

Permissions(5 analyzed)

Code Findings(17 patterns, 48 total)

Libraries(4 detected)

4 libraries detected, 3 with known vulnerabilities

Content Security Policy

No CSP Defined(1 issue)
MEDIUM
N/ANo CSP defined

This extension does not define a Content Security Policy. A CSP helps prevent XSS and code injection attacks.

Manifest Analysis(1 finding)

Resolved from __MSG_* i18n placeholders:

Name: Adding Furigana Function - Sateraito Office

Description: Adding Furigana Function allow to show the reading of a Kanji character by writing Furigana character at its side.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

External Domains(22)

ariya.ofilabs.comblog.izs.mecamo.githubusercontent.comcdnjs.comconnalle.blogspot.comecma-international.orgeev.eeen.wikipedia.orggetbootstrap.comgithub.comjquery.comjquery.orgjsperf.commathiasbynens.benodejs.orgpopper.js.orgserver.netsizzlejs.comstackpath.bootstrapcdn.comuse.fontawesome.comwww.apache.orgwww.ecma-international.org

Indicators of Compromise

3633 indicators of compromise found

File Statistics

50
Total Files
18
JS Files
19.0 MB
Total Size

Other Scanned Extensions