Read Aloud: Text to Speech (TTS, Listen to Text)Security Analysis

Chromev2.0.19MV3March 4, 2026 at 03:30 AM
Potentially unsafe

This extension shows concerning patterns that may indicate risky behavior. Proceed with caution.

6.0HIGH
6.0 HIGHRaw: 7.5

This extension shows significant risk signals. Review the findings below carefully before installing or continuing to use it.

Based on 10 permissions including high-risk ones, 192 code findings, 3 dangerous combinations.

Trust Signals(4.5/10)

Users
600K
Rating
3.8(3K reviews)
Status
Featured

Dangerous Combinations(3)

MEDIUMTab tracking API + external communication

Extension uses tab tracking APIs (onUpdated/query) and communicates with external servers — potential browsing surveillance.

tabs+tabs API usage + external network
CRITICALNetwork interception + external communication

Extension intercepts network traffic and sends data externally — potential man-in-the-middle behavior.

webRequest/webRequestBlocking+external network request
CRITICALAll-sites access + keyboard capture

Extension has access to all sites and captures keyboard input — behavior consistent with a keylogger.

<all_urls>+keylogger_pattern
Permissions
7.0/10
Code
7.2/10
Combinations
10.0/10
Manifest/CSP
6.1/10

Permissions(10 analyzed)

Code Findings(21 patterns, 192 total)

Libraries(2 detected)

2 libraries detected

Content Security Policy

No CSP Defined(1 issue)
MEDIUM
N/ANo CSP defined

This extension does not define a Content Security Policy. A CSP helps prevent XSS and code injection attacks.

Manifest Analysis(4 findings)

Resolved from __MSG_* i18n placeholders:

Name: Read Aloud: Text to Speech (TTS, Listen to Text)

Description: Text to Speech (TTS) reads aloud text, PDFs & e-books with natural voices.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

HIGH
web_accessible_resourcesJS files exposed to web pages

JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

LOW
externally_connectableExternal messaging enabled

Extension accepts messages from 3 external pattern(s). Verify these are trusted origins.

External Domains(15)

addons.mozilla.orgapp.readaloud.netchromewebstore.google.comfeross.orgfetch.spec.whatwg.orggithub.comlocalhostmicrosoftedge.microsoft.comreact.devreactjs.orgreactrouter.comsntry.sysmon.infowebostv.developer.lge.comwww.example.comwww.regextester.com

Indicators of Compromise

36 indicators of compromise found

File Statistics

47
Total Files
5
JS Files
4.4 MB
Total Size

Other Scanned Extensions