Flashback Flash PlayerSecurity Analysis

Chromev1.0.5MV3February 18, 2026 at 11:38 AM
Potentially unsafe

This extension shows concerning patterns that may indicate risky behavior. Proceed with caution.

7.8HIGH
7.8 HIGH

This extension shows significant risk signals. Review the findings below carefully before installing or continuing to use it.

Based on 7 permissions including high-risk ones, 37 code findings, 1 dangerous combination.

Trust Signals(1.0/10)

Users
20K
Rating
0.0(22 reviews)

Dangerous Combinations(1)

CRITICALAll-sites access + keyboard capture

Extension has access to all sites and captures keyboard input — behavior consistent with a keylogger.

<all_urls>+keylogger_pattern
Permissions
7.0/10
Code
8.3/10
Combinations
10.0/10
Manifest/CSP
5.0/10

Permissions(7 analyzed)

Code Findings(18 patterns, 37 total)

Content Security Policy

No CSP Defined(1 issue)
MEDIUM
N/ANo CSP defined

This extension does not define a Content Security Policy. A CSP helps prevent XSS and code injection attacks.

Manifest Analysis(2 findings)

Resolved from __MSG_* i18n placeholders:

Name: Flashback Flash Player

Description: Step into the Past: FlashBack Extension Revives Your Favorite Flash Content

HIGH
web_accessible_resourcesJS files exposed to web pages

JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

External Domains(4)

github.comnpms.ioreactjs.orgruffle.rs

Indicators of Compromise

5 indicators of compromise found

File Statistics

81
Total Files
10
JS Files
12.6 MB
Total Size

Other Scanned Extensions