This extension shows critical risk indicators. It requests highly sensitive permissions combined with suspicious code patterns. Proceed with extreme caution.
Based on 16 permissions including high-risk ones, 222 code findings, 5 dangerous combinations.
Extension has cookie access and sends data to external servers — potential session token theft.
Extension tracks open tabs and communicates with external servers — potential browsing surveillance.
Extension intercepts network traffic and sends data externally — potential man-in-the-middle behavior.
Extension communicates with native apps and executes dynamic code — potential sandbox escape vector.
Extension has access to all sites and captures keyboard input — behavior consistent with a keylogger.
16 libraries detected
object-src is not set to 'none'. Plugins like Flash can be embedded, which may allow code execution.
Resolved from __MSG_* i18n placeholders:
Description: Avira Password Manager saves, manages, and syncs all your passwords across all your devices.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
Extension accepts messages from 1 external pattern(s). Verify these are trusted origins.
370 indicators of compromise found