QuillBot: AI Writing and Grammar Checker ToolSecurity Analysis

Chromev4.62.0MV3February 16, 2026 at 03:23 PM
10.0CRITICAL
10.0 CRITICAL

This extension shows critical risk indicators. It requests highly sensitive permissions combined with suspicious code patterns. Proceed with extreme caution.

Based on 18 permissions including high-risk ones, 320 code findings, 2 dangerous combinations.

Dangerous Combinations(2)

CRITICALCookie access + external network

Extension has cookie access and sends data to external servers — potential session token theft.

cookies+external network request
CRITICALAll-sites access + keyboard capture

Extension has access to all sites and captures keyboard input — behavior consistent with a keylogger.

<all_urls>+keylogger_pattern
Permissions
10.0/10
Code
10.0/10
Combinations
10.0/10
Manifest/CSP
10.0/10

Permissions(18 analyzed)

Code Findings(29 patterns, 320 total)

Libraries(1 detected)

1 library detected

Content Security Policy

CSP Present(1 issue)
LOW
object-srcobject-src not restricted

object-src is not set to 'none'. Plugins like Flash can be embedded, which may allow code execution.

Manifest Analysis(15 findings)

Resolved from __MSG_* i18n placeholders:

Name: QuillBot: AI Writing and Grammar Checker Tool

Description: Elevate your writing with QuillBot's AI-powered productivity tools: Grammar Checker, Paraphrasing Tool, AI writer, and more!

HIGH
web_accessible_resourcesJS files exposed to web pages

JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

HIGH
web_accessible_resourcesJS files exposed to web pages

JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

HIGH
web_accessible_resourcesJS files exposed to web pages

JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

HIGH
web_accessible_resourcesJS files exposed to web pages

JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

HIGH
web_accessible_resourcesJS files exposed to web pages

JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

LOW
externally_connectableExternal messaging enabled

Extension accepts messages from 5 external pattern(s). Verify these are trusted origins.

MEDIUM
content_scriptsContent script injected on all URLs

Content script matches <all_urls>, executing on every website the user visits.

MEDIUM
content_scriptsContent script injected on all URLs

Content script matches <all_urls>, executing on every website the user visits.

MEDIUM
content_scriptsContent script injected on all URLs

Content script matches <all_urls>, executing on every website the user visits.

External Domains(48)

api.eu.amplitude.comapi.lab.amplitude.comapi.lab.eu.amplitude.comapi.languagetool.orgapi2.amplitude.comapps.apple.combrowser.sentry-cdn.combugs.webkit.orgcerberus.languagetool.orgchromewebstore.google.comcollector.quillbot.comdocs.google.comedit-stream.quillbot.comemscripten.orgfb.meflag.lab.amplitude.comflag.lab.eu.amplitude.comforms.glegithub.comhelp.quillbot.comlanguagetool.orglocalhostmail.google.commicrosoftedge.microsoft.commozilla.github.iomui.comnpms.iool-collector.quillbot.comol-collector.quillbot.devpolicies.google.comprosemirror.netpurl.orgqa.quillbot.devqb-extension.firebaseio.comquillbot.comquillbot.devreactjs.orgschemas.microsoft.comschemas.openxmlformats.orgsentry-extension.quillbot.comsentry.iospotlightjs.comstream.quillbot.comstuk.github.ioworkspace.google.comwww.docs.developers.amplitude.comwww.example.comwww.google-analytics.com

Indicators of Compromise

245 indicators of compromise found

File Statistics

319
Total Files
25
JS Files
68.7 MB
Total Size

Other Scanned Extensions