Sider: Chat with all AI: GPT-5, Claude, DeepSeek, Gemini, GrokSecurity Analysis

Chromev5.25.5MV3February 16, 2026 at 03:55 PM
9.8CRITICAL
9.8 CRITICAL

This extension shows critical risk indicators. It requests highly sensitive permissions combined with suspicious code patterns. Proceed with extreme caution.

Based on 228 permissions including high-risk ones, 630 code findings, 3 dangerous combinations.

Dangerous Combinations(3)

CRITICALCookie access + external network

Extension has cookie access and sends data to external servers — potential session token theft.

cookies+external network request
HIGHTab tracking + external communication

Extension tracks open tabs and communicates with external servers — potential browsing surveillance.

tabs+external network request
CRITICALAll-sites access + keyboard capture

Extension has access to all sites and captures keyboard input — behavior consistent with a keylogger.

<all_urls>+keylogger_pattern
Permissions
10.0/10
Code
10.0/10
Combinations
10.0/10
Manifest/CSP
7.8/10

Permissions(228 analyzed)

Code Findings(28 patterns, 630 total)

Libraries(10 detected)

10 libraries detected

Content Security Policy

CSP Present(2 issues)
MEDIUM
script-srcHTTP scheme allowed

Allowing the http: scheme enables loading scripts over insecure connections, vulnerable to MITM attacks.

LOW
object-srcobject-src not restricted

object-src is not set to 'none'. Plugins like Flash can be embedded, which may allow code execution.

Manifest Analysis(3 findings)

Resolved from __MSG_* i18n placeholders:

Name: Sider: Chat with all AI: GPT-5, Claude, DeepSeek, Gemini, Grok

Description: ChatGPT, DeepSeek, Gemini, Claude, Grok all in one AI sidebar, for AI search, read, and write.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

MEDIUM
content_scriptsContent script injected on all URLs

Content script matches <all_urls>, executing on every website the user visits.

HIGH
content_scriptsAggressive content script injection

Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.

External Domains(60)

**.google.com*.microsoft.com.+aapi.anthropic.comapi.deepseek.comapi.groq.comapi.openai.comapidomain.gptshere.comawesomegpts.aiaws.amazon.combbase-ui.comchat.openai.comchatgpt.comchromewebstore.google.comen.wikipedia.orgevent.sider.aifb.mefiles.oaiusercontent.comgenerativelanguage.googleapis.comgithub.comjsonplaceholder.typicode.comlocalhostmicrosoftedge.microsoft.comnews.ycombinator.comnpms.ioplatform.openai.compreview.sider.aipub-cdn.sider.aireact-native.canny.ioreactjs.orgreddit.com${breddit.com${vreddit.com${wresource_name.openai.azure.comresource_name.services.ai.azure.comroast-vs-boast.${le.domains3-fips.dualstack.us-east-1.{partitionresults3-fips.dualstack.{regions3-fips.us-east-1.{partitionresults3-fips.{regions3-object-lambda-fips.{regions3-object-lambda.{regions3.dualstack.us-east-1.{partitionresults3.dualstack.{regions3.{partitionresults3.{regions3express-control-fips.{regions3express-control.{regionsider.aitcr9i.chat.openai.comu0442www.google-analytics.comwww.i18next.comwww.youtube.comx{accesspointname{bucket

Indicators of Compromise

250 indicators of compromise found

File Statistics

292
Total Files
34
JS Files
87.0 MB
Total Size

Other Scanned Extensions