This extension shows concerning patterns that may indicate risky behavior. Proceed with caution.
This extension shows significant risk signals. Review the findings below carefully before installing or continuing to use it.
Based on 12 permissions including high-risk ones, 92 code findings, 5 dangerous combinations.
Extension has cookie access and sends data to external servers — potential session token theft.
Extension uses tab tracking APIs (onUpdated/query) and communicates with external servers — potential browsing surveillance.
Extension intercepts network traffic and sends data externally — potential man-in-the-middle behavior.
Extension communicates with native apps and executes dynamic code — potential sandbox escape vector.
Extension has access to all sites and captures keyboard input — behavior consistent with a keylogger.
object-src is not set to 'none'. Plugins like Flash can be embedded, which may allow code execution.
Resolved from __MSG_* i18n placeholders:
Name: ExpressVPN: VPN & proxy browser extension
Description: Go online safely with blazing-fast speed. Switch locations, access content, and toggle between proxy mode and full app control
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
externally_connectable uses broad patterns, allowing any website to establish a messaging channel with the extension. This can be exploited to trigger extension actions from malicious pages.
Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.
11 indicators of compromise found