TouchEn PC보안 확장Security Analysis

Chromev1.0.2.4MV3February 16, 2026 at 02:53 PM
8.2CRITICAL
8.2 CRITICAL

This extension shows critical risk indicators. It requests highly sensitive permissions combined with suspicious code patterns. Proceed with extreme caution.

Based on 3 permissions including high-risk ones, 12 code findings.

Permissions
9.5/10
Code
8.9/10
Combinations
0.0/10
Manifest/CSP
8.0/10

Permissions(3 analyzed)

Code Findings(8 patterns, 12 total)

Content Security Policy

No CSP Defined(1 issue)
MEDIUM
N/ANo CSP defined

This extension does not define a Content Security Policy. A CSP helps prevent XSS and code injection attacks.

Manifest Analysis(3 findings)

HIGH
web_accessible_resourcesJS files exposed to web pages

JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

HIGH
content_scriptsAggressive content script injection

Content script runs at document_start in ALL frames on ALL URLs. This gives the extension deep access to every page load, including iframes.

Indicators of Compromise

2 indicators of compromise found

File Statistics

8
Total Files
3
JS Files
37.8 KB
Total Size

Other Scanned Extensions