Cookie-EditorSecurity Analysis

Chromev1.13.0MV3February 18, 2026 at 11:52 AM
Use with caution

This extension requests significant permissions. It has 2M+ users, a 4.1 star rating, but review the findings below.

5.0MEDIUM
5.0 MEDIUMRaw: 5.6

This extension shows some risk signals that are common in legitimate extensions but worth reviewing. Check the details below.

Based on 4 permissions including high-risk ones, 6 code findings, 1 dangerous combination.

Trust Signals(3.0/10)

Users
2.0M
Rating
4.1(389 reviews)

Dangerous Combinations(1)

HIGHCookie access + external network

Extension has cookie access and sends data to external servers — potential session token theft.

cookies+external network request
Permissions
7.0/10
Code
5.3/10
Combinations
7.0/10
Manifest/CSP
1.8/10

Permissions(4 analyzed)

Code Findings(5 patterns, 6 total)

Content Security Policy

No CSP Defined(1 issue)
MEDIUM
N/ANo CSP defined

This extension does not define a Content Security Policy. A CSP helps prevent XSS and code injection attacks.

Manifest Analysis(1 finding)

INFO
devtools_pageHas DevTools panel

Extension registers a DevTools panel page. DevTools extensions have access to inspected page network traffic and DOM.

External Domains(12)

aurainc.sjv.iobugzilla.mozilla.orgcookie-editor.comcurl.haxx.seget.incogni.iogithub.comgo.nordvpn.netnamecheap.pxf.ioskillshare.eqcm.netstackoverflow.comtab.gladly.iothe-curiosity-box.pxf.io

Indicators of Compromise

3 indicators of compromise found

File Statistics

68
Total Files
31
JS Files
821.1 KB
Total Size

Other Scanned Extensions