Google Input ToolsSecurity Analysis

Chromev11.4.0.0MV3February 16, 2026 at 03:28 PM
9.4CRITICAL
9.4 CRITICAL

This extension shows critical risk indicators. It requests highly sensitive permissions combined with suspicious code patterns. Proceed with extreme caution.

Based on 6 permissions including high-risk ones, 20 code findings, 2 dangerous combinations.

Dangerous Combinations(2)

HIGHTab tracking + external communication

Extension tracks open tabs and communicates with external servers — potential browsing surveillance.

tabs+external network request
CRITICALAll-sites access + keyboard capture

Extension has access to all sites and captures keyboard input — behavior consistent with a keylogger.

<all_urls>+keylogger_pattern
Permissions
9.5/10
Code
9.9/10
Combinations
10.0/10
Manifest/CSP
6.7/10

Permissions(6 analyzed)

Code Findings(10 patterns, 20 total)

Content Security Policy

No CSP Defined(1 issue)
MEDIUM
N/ANo CSP defined

This extension does not define a Content Security Policy. A CSP helps prevent XSS and code injection attacks.

Manifest Analysis(2 findings)

Resolved from __MSG_* i18n placeholders:

Name: Google Input Tools

Description: Input Tools lets you type in the language of your choice.

HIGH
web_accessible_resourcesJS files exposed to web pages

JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

External Domains(9)

*csi.gstatic.comdrive.google.comeddieantonio.cagithub.cominputtools.google.comssl.gstatic.comwww.altlab.devwww.gstatic.com

Indicators of Compromise

3 indicators of compromise found

File Statistics

306
Total Files
225
JS Files
2.4 MB
Total Size

Other Scanned Extensions