This extension exhibits behaviors commonly associated with malware. Installation is not recommended.
This extension shows critical risk indicators. It requests highly sensitive permissions combined with suspicious code patterns. Proceed with extreme caution.
Based on 9 permissions including high-risk ones, 144 code findings, 1 dangerous combination.
Extension intercepts network traffic and sends data externally — potential man-in-the-middle behavior.
17 libraries detected, 4 with known vulnerabilities
This extension does not define a Content Security Policy. A CSP helps prevent XSS and code injection attacks.
Resolved from __MSG_* i18n placeholders:
Name: MyJDownloader Browser Extension
Description: Adds MyJDownloader to your browser, a service that enables you to remote control your JDownloader.
Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.
Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.
Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.
Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.
Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.
Extension uses a persistent background page (always running). This is a MV2 pattern that keeps the extension loaded in memory at all times.
17 indicators of compromise found