Tackker - Free keylogger toolSecurity Analysis

Chromev2.5MV3February 18, 2026 at 12:11 PM
Potentially unsafe

This extension shows concerning patterns that may indicate risky behavior. Proceed with caution.

Known Security Incidents(1)

Critical2024-12Resolved

Compromised in Cyberhaven supply chain attack

Extension was among 35+ extensions compromised in the December 2024 supply chain attack campaign that injected data-stealing code.

6.7HIGH
6.7 HIGHRaw: 7.4

This extension shows significant risk signals. Review the findings below carefully before installing or continuing to use it.

Based on 4 permissions including high-risk ones, 27 code findings, 1 dangerous combination.

Trust Signals(2.5/10)

Users
20K
Rating
4.0(71 reviews)

Dangerous Combinations(1)

CRITICALAll-sites access + keyboard capture

Extension has access to all sites and captures keyboard input — behavior consistent with a keylogger.

<all_urls>+keylogger_pattern
Permissions
7.0/10
Code
8.0/10
Combinations
10.0/10
Manifest/CSP
3.1/10

Permissions(4 analyzed)

Code Findings(14 patterns, 27 total)

Libraries(3 detected)

3 libraries detected, 1 with known vulnerabilities

Content Security Policy

No CSP Defined(1 issue)
MEDIUM
N/ANo CSP defined

This extension does not define a Content Security Policy. A CSP helps prevent XSS and code injection attacks.

Manifest Analysis(1 finding)

MEDIUM
content_scriptsContent script injected on all URLs

Content script matches <all_urls>, executing on every website the user visits.

External Domains(10)

datatables.netdev.test123.comgetbootstrap.comgithub.comintamema.compopper.js.orgstackpath.bootstrapcdn.comstagging.tackker.comwww.datatables.netwww.tackker.com

Indicators of Compromise

8 indicators of compromise found

File Statistics

18
Total Files
7
JS Files
515.0 KB
Total Size

Other Scanned Extensions