uBlock Origin LiteSecurity Analysis

Chromev2026.323.2044MV3March 26, 2026 at 01:06 PM
Potentially unsafe

This extension shows concerning patterns that may indicate risky behavior. Proceed with caution.

5.7MEDIUM
5.7 MEDIUMRaw: 8.7

This extension shows some risk signals that are common in legitimate extensions but worth reviewing. Check the details below.

Based on 5 permissions including high-risk ones, 196 code findings, 1 dangerous combination.

Trust Signals(6.0/10)

Users
16.0M
Rating
4.3(3K reviews)
Status
Featured

Dangerous Combinations(1)

CRITICALAll-sites access + keyboard capture

Extension has access to all sites and captures keyboard input — behavior consistent with a keylogger.

<all_urls>+keylogger_pattern
Permissions
7.0/10
Code
10.0/10
Combinations
10.0/10
Manifest/CSP
7.6/10

Permissions(5 analyzed)

Code Findings(20 patterns, 196 total)

Libraries(3 detected)

3 libraries detected

Content Security Policy

No CSP Defined(1 issue)
MEDIUM
N/ANo CSP defined

This extension does not define a Content Security Policy. A CSP helps prevent XSS and code injection attacks.

Manifest Analysis(6 findings)

Resolved from __MSG_* i18n placeholders:

Name: uBlock Origin Lite

Description: An efficient content blocker. Blocks ads, trackers, miners, and more immediately upon installation.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

HIGH
web_accessible_resourcesJS files exposed to web pages

JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

External Domains(133)

$1${hostname${s4pda.toad.jp.ap.valuecommerce.comadclick.g.doubleclick.netadguard.comaffiliate.suruga-ya.jpaffportal.bhphoto.comal.al.dmm.co.jpal.dmm.comal.fanza.co.jpamzn.toapi2.zoomit.irapp.adjust.comatmedia.linkazrom.netbugs.webkit.orgcadenaser.comcandyai.ggcc.cdn.plyr.iocdns.6hiidude.goldchecklink.mail.ruclick.email4customers.comclick.linksynergy.comclick.mail.ruclicker.mail.ruclicks.trx-hub.comcna.stcodemirror.netcolab.research.google.comconsent.youtube.comcrowdin.comcts.businesswire.comdatatracker.ietf.orgdeeplink.musescore.comdeveloper.apple.comdevelopers.google.comdisq.usdq.h1g.jpdragontea.inkdrivevideo.xyzensonhaber.meflagpedia.netfontawesome.comfsx.i-run.frgate.scgithub.comgo.2038.progo.redirectingat.comgo.rmhfrtnd.comgo.skimresources.comgoessner.netgoogleads.g.doubleclick.nethamtamovie.nlhb.afl.rakuten.co.jphtml-load.comi.imgur.comimgprime.cominvol.cojsperf.coml.vrgl.irlanding.brazzersnetwork.comlauncher.spot.imlink.asiaon.toplinkshortify.comloawa.commathiasbynens.bemetager.orgmozilla.orgmths.benl.pepper.comofferdaily.ironline.adservicemedia.dkoverclockers.rupagead2.googlesyndication.compaid.outbrain.compcmax.jppikabu.rurcm-fe.amazon-adsystem.comredirect.viglink.comrobot.mos.rurutube.rusearchfox.orgshop-links.coshopping.yahoo.comslickdeals.netspreaker.onelink.mesteamcommunity.comsupport.google.comthumpertalk.comtools.ietf.orgtoonhub4u.comtrack.adtraction.comtrack.effiliation.comublock0.invalidunlock.uberxviral.comv.wpimg.plw3c.github.iowhulsaux.comwww.www.adtival.networkwww.amazon.co.jpwww.amazon.dewww.chollometro.comwww.cse.yorku.cawww.davidkrmela.comwww.dealabs.comwww.deezer.comwww.e-nls.comwww.facebook.comwww.gnu.orgwww.gosuslugi.ruwww.haber7.comwww.hotukdeals.comwww.jdoqocy.comwww.jsdelivr.comwww.karkkainen.comwww.linkedin.comwww.longosto.shopwww.mydealz.dewww.pelando.com.brwww.pepper.plwww.pepper.ruwww.polybuzz.aiwww.preisjaeger.atwww.promodescuentos.comwww.reddit.comwww.sinpasyts.comwww.youtube.comzxro.com

Indicators of Compromise

866 indicators of compromise found

File Statistics

1001
Total Files
331
JS Files
32.4 MB
Total Size

Other Scanned Extensions