This extension exhibits behaviors commonly associated with malware. Installation is not recommended.
This extension shows critical risk indicators. It requests highly sensitive permissions combined with suspicious code patterns. Proceed with extreme caution.
Based on 226 permissions including high-risk ones, 93 code findings, 3 dangerous combinations.
Extension has cookie access and sends data to external servers — potential session token theft.
Extension reads clipboard and communicates externally — potential credential or crypto address theft.
Extension has access to all sites and captures keyboard input — behavior consistent with a keylogger.
12 libraries detected
This extension does not define a Content Security Policy. A CSP helps prevent XSS and code injection attacks.
Resolved from __MSG_* i18n placeholders:
Name: BrowserGPT: ChatGPT Anywhere Powered by GPT 4
Description: Write, reword, and translate 8x faster. Reply to emails in a click. Works on Google Docs, Gmail, YouTube, Twitter, Instagram, etc.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
JavaScript files are exposed as web-accessible resources. Matched websites can load and interact with extension scripts.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
Content script matches <all_urls>, executing on every website the user visits.
Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.
Content script matches <all_urls>, executing on every website the user visits.
414 indicators of compromise found