Avast Online Security & PrivacySecurity Analysis

Chromev22.12.9MV3February 16, 2026 at 02:55 PM

Known Security Incidents(1)

Critical2020-01Resolved

Mass collection and sale of browsing data

Avast collected granular browsing data from 100M+ users via browser extensions and sold it through subsidiary Jumpshot. FTC later fined Avast $16.5M.

View source →
9.6CRITICAL
9.6 CRITICAL

This extension shows critical risk indicators. It requests highly sensitive permissions combined with suspicious code patterns. Proceed with extreme caution.

Based on 10 permissions including high-risk ones, 88 code findings, 1 dangerous combination.

Dangerous Combinations(1)

HIGHTab tracking + external communication

Extension tracks open tabs and communicates with external servers — potential browsing surveillance.

tabs+external network request
Permissions
10.0/10
Code
10.0/10
Combinations
7.0/10
Manifest/CSP
9.2/10

Permissions(10 analyzed)

Code Findings(15 patterns, 88 total)

Libraries(4 detected)

4 libraries detected

Content Security Policy

No CSP Defined(1 issue)
MEDIUM
N/ANo CSP defined

This extension does not define a Content Security Policy. A CSP helps prevent XSS and code injection attacks.

Manifest Analysis(6 findings)

HIGH
web_accessible_resourcesJS files exposed to web pages

JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

MEDIUM
web_accessible_resourcesJS files exposed to web pages

JavaScript files are exposed as web-accessible resources. Matched websites can load and interact with extension scripts.

MEDIUM
content_scriptsContent script injected on all URLs

Content script matches <all_urls>, executing on every website the user visits.

MEDIUM
content_scriptsContent script injected on all URLs

Content script matches <all_urls>, executing on every website the user visits.

HIGH
content_scriptsAggressive content script injection

Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.

External Domains(4)

github.comnpms.iowww.apache.orgwww.avast.com

Indicators of Compromise

136 indicators of compromise found

File Statistics

79
Total Files
10
JS Files
11.6 MB
Total Size

Other Scanned Extensions