Custom Cursor for Chrome™Security Analysis

Chromev3.3.5MV3February 16, 2026 at 03:08 PM
8.6CRITICAL
8.6 CRITICAL

This extension shows critical risk indicators. It requests highly sensitive permissions combined with suspicious code patterns. Proceed with extreme caution.

Based on 7 permissions including high-risk ones, 28 code findings.

Permissions
9.5/10
Code
10.0/10
Combinations
0.0/10
Manifest/CSP
7.8/10

Permissions(7 analyzed)

Code Findings(14 patterns, 28 total)

Content Security Policy

No CSP Defined(1 issue)
MEDIUM
N/ANo CSP defined

This extension does not define a Content Security Policy. A CSP helps prevent XSS and code injection attacks.

Manifest Analysis(4 findings)

Resolved from __MSG_* i18n placeholders:

Name: Custom Cursor for Chrome™

Description: Fun custom cursors for Chrome™. Use a large collection of free cursors or upload your own.

HIGH
web_accessible_resourcesJS files exposed to web pages

JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

LOW
externally_connectableExternal messaging enabled

Extension accepts messages from 1 external pattern(s). Verify these are trusted origins.

MEDIUM
content_scriptsContent script injected on all URLs

Content script matches <all_urls>, executing on every website the user visits.

External Domains(13)

community.custom-cursor.comcustom-cursor.comdiscord.comfb.megit.iogithub.comreactjs.orgsocial-plugins.line.metelegram.metwitter.comwww.facebook.comwww.pinterest.comwww.youtube.com

Indicators of Compromise

8 indicators of compromise found

File Statistics

113
Total Files
5
JS Files
6.0 MB
Total Size

Other Scanned Extensions