This extension shows critical risk indicators. It requests highly sensitive permissions combined with suspicious code patterns. Proceed with extreme caution.
Based on 13 permissions including high-risk ones, 106 code findings, 5 dangerous combinations.
Extension has cookie access and sends data to external servers — potential session token theft.
Extension tracks open tabs and communicates with external servers — potential browsing surveillance.
Extension intercepts network traffic and sends data externally — potential man-in-the-middle behavior.
Extension communicates with native apps and executes dynamic code — potential sandbox escape vector.
Extension has access to all sites and captures keyboard input — behavior consistent with a keylogger.
1 library detected
object-src is not set to 'none'. Plugins like Flash can be embedded, which may allow code execution.
Resolved from __MSG_* i18n placeholders:
Description: Display web pages using IE within Chrome. Use Java, Silverlight, ActiveX, Sharepoint, and more.
JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
Extension accepts messages from 1 external pattern(s). Verify these are trusted origins.
Content script matches <all_urls>, executing on every website the user visits.
22 indicators of compromise found