This extension shows critical risk indicators. It requests highly sensitive permissions combined with suspicious code patterns. Proceed with extreme caution.
Based on 35 permissions including high-risk ones, 924 code findings, 2 dangerous combinations.
Extension reads clipboard and communicates externally — potential credential or crypto address theft.
Extension has access to all sites and captures keyboard input — behavior consistent with a keylogger.
object-src is not set to 'none'. Plugins like Flash can be embedded, which may allow code execution.
Resolved from __MSG_* i18n placeholders:
Name: Mote for Google Chrome™
Description: Inclusive learning software that adapts to every student's needs.
JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
Extension accepts messages from 3 external pattern(s). Verify these are trusted origins.
Content script matches <all_urls>, executing on every website the user visits.
Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.
Content script matches <all_urls>, executing on every website the user visits.
37 indicators of compromise found