This extension requests significant permissions. It has 6M+ users, a 4.6 star rating, is published by Bitwarden Inc., but review the findings below.
This extension shows some risk signals that are common in legitimate extensions but worth reviewing. Check the details below.
Based on 21 permissions including high-risk ones, 167 code findings, 4 dangerous combinations.
Extension uses tab tracking APIs (onUpdated/query) and communicates with external servers — potential browsing surveillance.
Extension intercepts network traffic and sends data externally — potential man-in-the-middle behavior.
Extension reads clipboard and communicates externally — potential credential or crypto address theft.
Extension communicates with native apps and executes dynamic code — potential sandbox escape vector.
5 libraries detected
object-src is not set to 'none'. Plugins like Flash can be embedded, which may allow code execution.
Resolved from __MSG_* i18n placeholders:
Name: Bitwarden Password Manager
Description: At home, at work, or on the go, Bitwarden easily secures all your passwords, passkeys, and sensitive information
JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
Content script matches <all_urls>, executing on every website the user visits.
Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.
146 indicators of compromise found