This extension shows concerning patterns that may indicate risky behavior. Proceed with caution.
Collecting browsing data via extensions
SimilarWeb extensions collected detailed browsing data to feed its web analytics platform. The data collection scope went far beyond what users expected.
This extension shows significant risk signals. Review the findings below carefully before installing or continuing to use it.
Based on 6 permissions including high-risk ones, 54 code findings, 2 dangerous combinations.
Extension uses tab tracking APIs (onUpdated/query) and communicates with external servers — potential browsing surveillance.
Extension intercepts network traffic and sends data externally — potential man-in-the-middle behavior.
1 library detected
object-src is not set to 'none'. Plugins like Flash can be embedded, which may allow code execution.
Resolved from __MSG_* i18n placeholders:
Name: Similarweb - Website Traffic & SEO Checker
Description: Instant website analysis and SEO metrics at your fingertips.
JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
Content script matches <all_urls>, executing on every website the user visits.
Content script matches <all_urls>, executing on every website the user visits.
Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.
7 indicators of compromise found