This extension requests significant permissions. Review the findings below before installing.
This extension shows some risk signals that are common in legitimate extensions but worth reviewing. Check the details below.
Based on 10 permissions including high-risk ones, 88 code findings.
This extension does not define a Content Security Policy. A CSP helps prevent XSS and code injection attacks.
Resolved from __MSG_* i18n placeholders:
Name: Todoist for Chrome: Planner & Calendar
Description: Organize work and life with Todoist for Chrome
JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
JavaScript files are exposed as web-accessible resources. Matched websites can load and interact with extension scripts.
22 indicators of compromise found