Shimeji Browser ExtensionSecurity Analysis

Chromev2.0.5MV3February 16, 2026 at 03:41 PM
9.2CRITICAL
9.2 CRITICAL

This extension shows critical risk indicators. It requests highly sensitive permissions combined with suspicious code patterns. Proceed with extreme caution.

Based on 3 permissions including high-risk ones, 34 code findings, 1 dangerous combination.

Dangerous Combinations(1)

CRITICALAll-sites access + keyboard capture

Extension has access to all sites and captures keyboard input — behavior consistent with a keylogger.

<all_urls>+keylogger_pattern
Permissions
9.0/10
Code
10.0/10
Combinations
10.0/10
Manifest/CSP
6.3/10

Permissions(3 analyzed)

Code Findings(15 patterns, 34 total)

Libraries(1 detected)

1 library detected

Content Security Policy

No CSP Defined(1 issue)
MEDIUM
N/ANo CSP defined

This extension does not define a Content Security Policy. A CSP helps prevent XSS and code injection attacks.

Manifest Analysis(3 findings)

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

LOW
externally_connectableExternal messaging enabled

Extension accepts messages from 1 external pattern(s). Verify these are trusted origins.

MEDIUM
content_scriptsContent script injected on all URLs

Content script matches <all_urls>, executing on every website the user visits.

External Domains(9)

feross.orgkilkakon.commantine.devmths.beo4505076721516544.ingest.sentry.ioreactjs.orgshimejis.xyzsprite.shimejis.xyzwww.example.com

Indicators of Compromise

4 indicators of compromise found

File Statistics

17
Total Files
3
JS Files
1.3 MB
Total Size

Other Scanned Extensions