Similarweb - Website Traffic & SEO CheckerSecurity Analysis

Chromev6.12.17MV3February 18, 2026 at 11:53 AM
Potentially unsafe

This extension shows concerning patterns that may indicate risky behavior. Proceed with caution.

Known Security Incidents(1)

Medium2020-08Resolved

Collecting browsing data via extensions

SimilarWeb extensions collected detailed browsing data to feed its web analytics platform. The data collection scope went far beyond what users expected.

6.4HIGH
6.4 HIGHRaw: 8.0

This extension shows significant risk signals. Review the findings below carefully before installing or continuing to use it.

Based on 6 permissions including high-risk ones, 54 code findings, 2 dangerous combinations.

Trust Signals(4.0/10)

Users
1.0M
Rating
2.6(4K reviews)

Dangerous Combinations(2)

MEDIUMTab tracking API + external communication

Extension uses tab tracking APIs (onUpdated/query) and communicates with external servers — potential browsing surveillance.

tabs+tabs API usage + external network
CRITICALNetwork interception + external communication

Extension intercepts network traffic and sends data externally — potential man-in-the-middle behavior.

webRequest/webRequestBlocking+external network request
Permissions
7.0/10
Code
8.0/10
Combinations
10.0/10
Manifest/CSP
7.1/10

Permissions(6 analyzed)

Code Findings(22 patterns, 54 total)

Libraries(1 detected)

1 library detected

Content Security Policy

CSP Present(1 issue)
LOW
object-srcobject-src not restricted

object-src is not set to 'none'. Plugins like Flash can be embedded, which may allow code execution.

Manifest Analysis(5 findings)

Resolved from __MSG_* i18n placeholders:

Name: Similarweb - Website Traffic & SEO Checker

Description: Instant website analysis and SEO metrics at your fingertips.

HIGH
web_accessible_resourcesJS files exposed to web pages

JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

MEDIUM
content_scriptsContent script injected on all URLs

Content script matches <all_urls>, executing on every website the user visits.

MEDIUM
content_scriptsContent script injected on all URLs

Content script matches <all_urls>, executing on every website the user visits.

HIGH
content_scriptsAggressive content script injection

Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.

External Domains(22)

account.similarweb.comadclick.g.doubleclick.netaddons.mozilla.orgaddons.opera.comapi-js.mixpanel.comapi.mixpanel.comcdn.growthbook.iocdn.mxpnl.comdata.similarweb.comdeveloper.matomo.orgfb.meforms.wix.comgithub.commatomo.similarweb.iomixpanel.commomentjs.comrank.similarweb.comreactjs.orgsw-extension.s3.amazonaws.comwww.highcharts.comwww.similarweb.comwww.youtube.com

Indicators of Compromise

7 indicators of compromise found

File Statistics

306
Total Files
8
JS Files
3.3 MB
Total Size

Other Scanned Extensions