This extension shows critical risk indicators. It requests highly sensitive permissions combined with suspicious code patterns. Proceed with extreme caution.
Based on 20 permissions including high-risk ones, 80 code findings, 1 dangerous combination.
Extension intercepts network traffic and sends data externally — potential man-in-the-middle behavior.
1 library detected
object-src is not set to 'none'. Plugins like Flash can be embedded, which may allow code execution.
Resolved from __MSG_* i18n placeholders:
Name: Pop up blocker for Chrome™ - Poper Blocker
Description: Block popups, ads, cookie requests, trackers, notifications, ads on social media & more. A clean browsing experience starts today.
JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
Extension accepts messages from 3 external pattern(s). Verify these are trusted origins.
Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.
Content script matches <all_urls>, executing on every website the user visits.
Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.
Content script matches <all_urls>, executing on every website the user visits.
136 indicators of compromise found