This extension shows critical risk indicators. It requests highly sensitive permissions combined with suspicious code patterns. Proceed with extreme caution.
Based on 19 permissions including high-risk ones, 52 code findings, 5 dangerous combinations.
Extension has cookie access and sends data to external servers — potential session token theft.
Extension tracks open tabs and communicates with external servers — potential browsing surveillance.
Extension reads browsing history and sends data externally — potential history exfiltration.
Extension manages other extensions and executes dynamic code — behavior consistent with malware dropper.
Extension communicates with native apps and executes dynamic code — potential sandbox escape vector.
4 libraries detected
This extension does not define a Content Security Policy. A CSP helps prevent XSS and code injection attacks.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
Extension accepts messages from 5 external pattern(s). Verify these are trusted origins.
Content script matches <all_urls>, executing on every website the user visits.
306 indicators of compromise found