EndNote ClickSecurity Analysis

Chromev3.5.0MV3February 16, 2026 at 03:28 PM
8.6CRITICAL
8.6 CRITICAL

This extension shows critical risk indicators. It requests highly sensitive permissions combined with suspicious code patterns. Proceed with extreme caution.

Based on 10 permissions including high-risk ones, 28 code findings.

Permissions
10.0/10
Code
10.0/10
Combinations
0.0/10
Manifest/CSP
5.9/10

Permissions(10 analyzed)

Code Findings(15 patterns, 28 total)

Content Security Policy

No CSP Defined(1 issue)
MEDIUM
N/ANo CSP defined

This extension does not define a Content Security Policy. A CSP helps prevent XSS and code injection attacks.

Manifest Analysis(2 findings)

Resolved from __MSG_* i18n placeholders:

Name: EndNote Click

Description: Fast, one-click access to millions of research papers.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

MEDIUM
content_scriptsContent script injected on all URLs

Content script matches <all_urls>, executing on every website the user visits.

External Domains(26)

access.clarivate.comapi.crossref.orgapps.webofknowledge.comclarivate.comclick.endnote.comclick.endnote.com.doi.orgfb.mefsso.springer.comgateway.webofknowledge.comiam.atypon.comjournals.healio.comjournals.sagepub.commol.medicalonline.jponlinelibrary.wiley.compubmed.ncbi.nlm.nih.govpubs.acs.orgreactjs.orgscholar.google.comshibboleth.cambridge.orgshibboleth2sp.jstor.orgsp.nature.comsupport.clarivate.comwebview.isho.jpwww.ncbi.nlm.nih.govwww.webofknowledge.com

Indicators of Compromise

13 indicators of compromise found

File Statistics

25
Total Files
5
JS Files
1.5 MB
Total Size

Other Scanned Extensions