MaxAI: Ask AI anything as you browse (GPT, Gemini, Claude, Grok, etc.)Security Analysis

Chromev8.36.0MV3February 18, 2026 at 12:01 PM
Potentially unsafe

This extension shows concerning patterns that may indicate risky behavior. Proceed with caution.

7.0HIGH
7.0 HIGHRaw: 8.8

This extension shows significant risk signals. Review the findings below carefully before installing or continuing to use it.

Based on 11 permissions including high-risk ones, 364 code findings, 3 dangerous combinations.

Trust Signals(5.0/10)

Users
700K
Rating
3.7(15K reviews)
Status
Featured

Dangerous Combinations(3)

CRITICALClipboard read + external communication

Extension reads clipboard and communicates externally — potential credential or crypto address theft.

clipboardRead+external network request
CRITICALExtension management + dynamic code execution

Extension manages other extensions and executes dynamic code — behavior consistent with malware dropper.

management+eval/Function/dynamic code
CRITICALAll-sites access + keyboard capture

Extension has access to all sites and captures keyboard input — behavior consistent with a keylogger.

<all_urls>+keylogger_pattern
Permissions
8.0/10
Code
9.4/10
Combinations
10.0/10
Manifest/CSP
7.1/10

Permissions(11 analyzed)

Code Findings(28 patterns, 364 total)

Libraries(8 detected)

8 libraries detected

Content Security Policy

No CSP Defined(1 issue)
MEDIUM
N/ANo CSP defined

This extension does not define a Content Security Policy. A CSP helps prevent XSS and code injection attacks.

Manifest Analysis(5 findings)

Resolved from __MSG_* i18n placeholders:

Name: MaxAI: Ask AI anything as you browse (GPT, Gemini, Claude, Grok, etc.)

Description: Save time with your AI assistant that helps you read, write, and search faster wherever you work online.

HIGH
web_accessible_resourcesJS files exposed to web pages

JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

MEDIUM
content_scriptsContent script injected on all URLs

Content script matches <all_urls>, executing on every website the user visits.

MEDIUM
content_scriptsContent script injected on all URLs

Content script matches <all_urls>, executing on every website the user visits.

MEDIUM
content_scriptsContent script injected on all URLs

Content script matches <all_urls>, executing on every website the user visits.

External Domains(129)

${e${h${o.title${s${y2a16z.comaccounts.google.comaimarketingengineers.comallianceforscience.orgapi-edge.cognitive.microsofttranslator.comapi-js.mixpanel.comapi.extensions-hub.comapi.maxai.meapi.openai.comapp.maxai.meastrobiology.combilling.stripe.combit.lyblog.csdn.netblog.googlebugs.webkit.orgcdn.mxpnl.comcheckout.stripe.comchromewebstore.google.comcloud.google.comcloud.tencent.comcloudnative.todealroom.netdocs.google.comdocs.oasis-open.orgdownload-chromium.appspot.comedge.microsoft.comelischolar.library.yale.edufb.mefeross.orggithub.bloggithub.comi.ytimg.comlocalhostlodash.comm.10100.comm.economictimes.commacvmlschemaurimail.163.commail.google.commail.protonmail.commail.qq.commail.yahoo.commedicalxpress.commicrosoftedge.microsoft.commixpanel.commui.comnews.ycombinator.comnotebooks.githubusercontent.comoctoverse.github.comopenjsf.orgopenoffice.orgoutlook.live.compmc.ncbi.nlm.nih.govpureseo.compurl.oclc.orgpurl.orgreact-dnd.github.ioreactjs.orgredux.js.orgreg.rainfocus.comresources.github.comschemas.microsoft.comschemas.openxmlformats.orgscholarworks.uark.eduseektraffic.netseo.yiguotech.comsheetjs.comsheetjs.openxmlformats.orgstartupsavant.comstatic-web.maxai.photossupport.apple.comsupport.google.comsupport.mozilla.orgtechcrunch.comtinyurl.comtwitter.comudc.libguides.comunbug.github.iounderscorejs.orguri.libguides.comviewscreen.githubusercontent.comwww.aarp.orgwww.affinity.cowww.apache.orgwww.baidu.comwww.bbc.comwww.bristol.ac.ukwww.britannica.comwww.commonsense.orgwww.croptrust.orgwww.dailysabah.comwww.example.comwww.facebook.comwww.forbes.comwww.freecodecamp.orgwww.goingvc.comwww.hematology.orgwww.icloud.comwww.infoq.cnwww.investopedia.comwww.jos.org.cnwww.labmedica.comwww.lifehack.orgwww.linkedin.comwww.livescience.comwww.maxai.cowww.maxai.mewww.naver.comwww.npr.orgwww.nytimes.comwww.opensourceway.communitywww.pcmag.comwww.quora.comwww.reuters.comwww.sci.newswww.scientificamerican.comwww.sogou.comwww.sohu.comwww.techexplorist.comwww.youshenet.comwww.youtube.comwww.zhanglianlei.comyoutube.com

Indicators of Compromise

226 indicators of compromise found

File Statistics

600
Total Files
198
JS Files
61.1 MB
Total Size

Other Scanned Extensions