This extension shows concerning patterns that may indicate risky behavior. Proceed with caution.
This extension shows some risk signals that are common in legitimate extensions but worth reviewing. Check the details below.
Based on 49 permissions including high-risk ones, 397 code findings, 6 dangerous combinations.
Extension has cookie access and sends data to external servers — potential session token theft.
Extension uses tab tracking APIs (onUpdated/query) and communicates with external servers — potential browsing surveillance.
Extension intercepts network traffic and sends data externally — potential man-in-the-middle behavior.
Extension reads browsing history and sends data externally — potential history exfiltration.
Extension communicates with native apps and executes dynamic code — potential sandbox escape vector.
Extension has access to all sites and captures keyboard input — behavior consistent with a keylogger.
2 libraries detected, 2 with known vulnerabilities
object-src is not set to 'none'. Plugins like Flash can be embedded, which may allow code execution.
Resolved from __MSG_* i18n placeholders:
Name: Adobe Acrobat: PDF edit, convert, sign tools
Description: Do more in Google Chrome with Adobe Acrobat PDF tools. View, fill, comment, sign, and try convert and compress tools.
JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
JavaScript files are exposed as web-accessible resources. Matched websites can load and interact with extension scripts.
JavaScript files are exposed as web-accessible resources. Matched websites can load and interact with extension scripts.
JavaScript files are exposed as web-accessible resources. Matched websites can load and interact with extension scripts.
JavaScript files are exposed as web-accessible resources. Matched websites can load and interact with extension scripts.
JavaScript files are exposed as web-accessible resources. Matched websites can load and interact with extension scripts.
JavaScript files are exposed as web-accessible resources. Matched websites can load and interact with extension scripts.
JavaScript files are exposed as web-accessible resources. Matched websites can load and interact with extension scripts.
JavaScript files are exposed as web-accessible resources. Matched websites can load and interact with extension scripts.
JavaScript files are exposed as web-accessible resources. Matched websites can load and interact with extension scripts.
Extension accepts messages from 3 external pattern(s). Verify these are trusted origins.
Content script matches <all_urls>, executing on every website the user visits.
61 indicators of compromise found