This extension shows concerning patterns that may indicate risky behavior. Proceed with caution.
Supply chain attack — malicious code injected
Attacker compromised a Cyberhaven employee's Chrome Web Store credentials via phishing and pushed a malicious update that exfiltrated cookies and auth tokens.
View source →This extension shows significant risk signals. Review the findings below carefully before installing or continuing to use it.
Based on 68 permissions including high-risk ones, 168 code findings, 4 dangerous combinations.
Extension has cookie access and sends data to external servers — potential session token theft.
Extension uses tab tracking APIs (onUpdated/query) and communicates with external servers — potential browsing surveillance.
Extension intercepts network traffic and sends data externally — potential man-in-the-middle behavior.
Extension manages other extensions and executes dynamic code — behavior consistent with malware dropper.
object-src is not set to 'none'. Plugins like Flash can be embedded, which may allow code execution.
JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.
5 indicators of compromise found