This extension shows critical risk indicators. It requests highly sensitive permissions combined with suspicious code patterns. Proceed with extreme caution.
Based on 3 permissions including high-risk ones, 36 code findings, 2 dangerous combinations.
Extension communicates with native apps and executes dynamic code — potential sandbox escape vector.
Extension has access to all sites and captures keyboard input — behavior consistent with a keylogger.
object-src is not set to 'none'. Plugins like Flash can be embedded, which may allow code execution.
JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
Content script matches <all_urls>, executing on every website the user visits.
Extension auto-updates from a custom server (https://edge.microsoft.com/extensionwebstorebase/v1/crx). Side-loaded extensions with custom update URLs can receive updates from arbitrary servers without Chrome Web Store review.
9 indicators of compromise found