This extension shows concerning patterns that may indicate risky behavior. Proceed with caution.
This extension shows significant risk signals. Review the findings below carefully before installing or continuing to use it.
Based on 11 permissions including high-risk ones, 36 code findings, 3 dangerous combinations.
Extension uses chrome.cookies.getAll for bulk cookie access and sends data to external servers — high risk of session token theft.
Extension uses tab tracking APIs (onUpdated/query) and communicates with external servers — potential browsing surveillance.
Extension intercepts network traffic and sends data externally — potential man-in-the-middle behavior.
object-src is not set to 'none'. Plugins like Flash can be embedded, which may allow code execution.
Resolved from __MSG_* i18n placeholders:
Name: FastSave
Description: Repost Instagram stories, save video, photo and Reels. Browse Instagram site like a mobile app.
JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.
Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.
17 indicators of compromise found