Mass collection and sale of browsing data
Avast collected granular browsing data from 100M+ users via browser extensions and sold it through subsidiary Jumpshot. FTC later fined Avast $16.5M.
View source →This extension shows critical risk indicators. It requests highly sensitive permissions combined with suspicious code patterns. Proceed with extreme caution.
Based on 10 permissions including high-risk ones, 88 code findings, 1 dangerous combination.
Extension tracks open tabs and communicates with external servers — potential browsing surveillance.
4 libraries detected
This extension does not define a Content Security Policy. A CSP helps prevent XSS and code injection attacks.
JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
JavaScript files are exposed as web-accessible resources. Matched websites can load and interact with extension scripts.
Content script matches <all_urls>, executing on every website the user visits.
Content script matches <all_urls>, executing on every website the user visits.
Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.
136 indicators of compromise found