This extension requests significant permissions. It has 43M+ users, a 4.8 star rating, is published by Grammarly, but review the findings below.
This extension shows some risk signals that are common in legitimate extensions but worth reviewing. Check the details below.
Based on 105 permissions including high-risk ones, 379 code findings, 5 dangerous combinations.
Extension uses chrome.cookies.getAll for bulk cookie access and sends data to external servers — high risk of session token theft.
Extension uses tab tracking APIs (onUpdated/query) and communicates with external servers — potential browsing surveillance.
Extension reads clipboard and communicates externally — potential credential or crypto address theft.
Extension communicates with native apps and executes dynamic code — potential sandbox escape vector.
Extension has access to all sites and captures keyboard input — behavior consistent with a keylogger.
6 libraries detected
object-src is not set to 'none'. Plugins like Flash can be embedded, which may allow code execution.
JavaScript files are exposed as web-accessible resources. Matched websites can load and interact with extension scripts.
Extension accepts messages from 1 external pattern(s). Verify these are trusted origins.
Content script matches <all_urls>, executing on every website the user visits.
317 indicators of compromise found