This extension shows concerning patterns that may indicate risky behavior. Proceed with caution.
This extension shows some risk signals that are common in legitimate extensions but worth reviewing. Check the details below.
Based on 12 permissions including high-risk ones, 67 code findings, 4 dangerous combinations.
Extension uses chrome.cookies.getAll for bulk cookie access and sends data to external servers — high risk of session token theft.
Extension uses tab tracking APIs (onUpdated/query) and communicates with external servers — potential browsing surveillance.
Extension intercepts network traffic and sends data externally — potential man-in-the-middle behavior.
Extension communicates with native apps and executes dynamic code — potential sandbox escape vector.
This extension does not define a Content Security Policy. A CSP helps prevent XSS and code injection attacks.
JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
320 indicators of compromise found