Affiliate link hijacking
Investigation revealed Honey was secretly replacing creator affiliate links with its own, diverting commissions from content creators who recommended products.
View source →This extension shows critical risk indicators. It requests highly sensitive permissions combined with suspicious code patterns. Proceed with extreme caution.
Based on 9 permissions including high-risk ones, 143 code findings, 3 dangerous combinations.
Extension has cookie access and sends data to external servers — potential session token theft.
Extension intercepts network traffic and sends data externally — potential man-in-the-middle behavior.
Extension has access to all sites and captures keyboard input — behavior consistent with a keylogger.
7 libraries detected
object-src is not set to 'none'. Plugins like Flash can be embedded, which may allow code execution.
Resolved from __MSG_* i18n placeholders:
Name: Honey: Automated Coupons & Rewards
Description: Save money and earn rewards when you shop online.
No manifest-level concerns found.
24 indicators of compromise found