MyJDownloader Browser ExtensionSecurity Analysis

Chromev3.3.20MV2February 18, 2026 at 11:42 AM
Dangerous

This extension exhibits behaviors commonly associated with malware. Installation is not recommended.

8.4CRITICAL
8.4 CRITICALRaw: 9.3

This extension shows critical risk indicators. It requests highly sensitive permissions combined with suspicious code patterns. Proceed with extreme caution.

Based on 9 permissions including high-risk ones, 144 code findings, 1 dangerous combination.

Trust Signals(2.0/10)

Users
500K

Dangerous Combinations(1)

CRITICALNetwork interception + external communication

Extension intercepts network traffic and sends data externally — potential man-in-the-middle behavior.

webRequest/webRequestBlocking+external network request
Permissions
8.5/10
Code
9.9/10
Combinations
10.0/10
Manifest/CSP
8.4/10

Permissions(8 analyzed)

Code Findings(26 patterns, 144 total)

Libraries(17 detected)

17 libraries detected, 4 with known vulnerabilities

Content Security Policy

No CSP Defined(1 issue)
MEDIUM
N/ANo CSP defined

This extension does not define a Content Security Policy. A CSP helps prevent XSS and code injection attacks.

Manifest Analysis(6 findings)

Resolved from __MSG_* i18n placeholders:

Name: MyJDownloader Browser Extension

Description: Adds MyJDownloader to your browser, a service that enables you to remote control your JDownloader.

HIGH
content_scriptsAggressive content script injection

Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.

HIGH
content_scriptsAggressive content script injection

Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.

HIGH
content_scriptsAggressive content script injection

Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.

HIGH
content_scriptsAggressive content script injection

Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.

HIGH
content_scriptsAggressive content script injection

Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.

LOW
background.persistentPersistent background page

Extension uses a persistent background page (always running). This is a MV2 pattern that keeps the extension loaded in memory at all times.

External Domains(86)

**.example.com127.0.0.1angularjs.orgapi.example.comapi.jdownloader.orgapi.jquery.comblog.alexmaccaw.comboard.jdownloader.orgbrowsehappy.combugs.chromium.orgbugs.jquery.combugs.webkit.orgbugzilla.mozilla.orgcaniuse.comcode.google.comconnect.microsoft.comcwe.mitre.orgdev.jquery.comdev.w3.orgdevelopers.whatwg.orgdocs.angularjs.orgdocs.closure-library.googlecode.comdocs.python.orgdrafts.csswg.orgdummycnl.jdownloader.orgen.wikipedia.orgerrors.angularjs.orges5.github.ioevil.comexample.comfetch.spec.whatwg.orgfoo.comfoo.example.comgetbootstrap.comgist.github.comgithub.comgoogle.comhaacked.comhammerjs.github.iohcaptcha.comhtml.spec.whatwg.orginfra.spec.whatwg.orgjames.padolsey.comjdownloader.orgjquery.comjquery.orgjquerymobile.comjs.foundationjsperf.comkangax.github.iolink.lodash.commodernizr.commsdn.microsoft.commy.jdownloader.orgmyapp.example.comopenradar.appspot.compromisesaplus.comrawgit.comrequirejs.orgserver.comsimon.html5.orgsizzlejs.comsrv*.assets.example.comsrv01.assets.example.comsrv02.assets.example.comstackoverflow.comstats.example.comsupport.jdownloader.orgtools.ietf.orgurl.comurl.spec.whatwg.orgweb.archive.orgwebkit.orgwiki.commonjs.orgwiki.whatwg.orgwww.aptana.comwww.ecma-international.orgwww.gravatar.comwww.html5rocks.comwww.ietf.orgwww.npmjs.comwww.owasp.orgwww.quirksmode.orgwww.ruby-doc.orgxhr.spec.whatwg.org

Indicators of Compromise

17 indicators of compromise found

File Statistics

93
Total Files
62
JS Files
4.1 MB
Total Size

Other Scanned Extensions