OrangeMonkeySecurity Analysis

Chromev2.0.13MV3February 16, 2026 at 03:36 PM
9.6CRITICAL
9.6 CRITICAL

This extension shows critical risk indicators. It requests highly sensitive permissions combined with suspicious code patterns. Proceed with extreme caution.

Based on 12 permissions including high-risk ones, 63 code findings, 2 dangerous combinations.

Dangerous Combinations(2)

HIGHTab tracking + external communication

Extension tracks open tabs and communicates with external servers — potential browsing surveillance.

tabs+external network request
CRITICALNetwork interception + external communication

Extension intercepts network traffic and sends data externally — potential man-in-the-middle behavior.

webRequest/webRequestBlocking+external network request
Permissions
10.0/10
Code
10.0/10
Combinations
10.0/10
Manifest/CSP
5.9/10

Permissions(12 analyzed)

Code Findings(24 patterns, 63 total)

Libraries(2 detected)

2 libraries detected

Content Security Policy

CSP Present(1 issue)
LOW
object-srcobject-src not restricted

object-src is not set to 'none'. Plugins like Flash can be embedded, which may allow code execution.

Manifest Analysis(2 findings)

Resolved from __MSG_* i18n placeholders:

Description: Lightweight Userscript manager. Provides userscripts support for Chromium browsers

HIGH
content_scriptsAggressive content script injection

Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.

MEDIUM
content_scriptsContent script injected on all URLs

Content script matches <all_urls>, executing on every website the user visits.

External Domains(9)

github.comgreasyfork.orgorangemonkey.siteraw.github.comstuartk.comstuk.github.iowiki.greasespot.netwww.google-analytics.comwww.webtoolkit.info

Indicators of Compromise

9 indicators of compromise found

File Statistics

36
Total Files
9
JS Files
1.7 MB
Total Size

Other Scanned Extensions