This extension shows critical risk indicators. It requests highly sensitive permissions combined with suspicious code patterns. Proceed with extreme caution.
Based on 17 permissions including high-risk ones, 741 code findings, 4 dangerous combinations.
Extension tracks open tabs and communicates with external servers — potential browsing surveillance.
Extension intercepts network traffic and sends data externally — potential man-in-the-middle behavior.
Extension manages other extensions and executes dynamic code — behavior consistent with malware dropper.
Extension has access to all sites and captures keyboard input — behavior consistent with a keylogger.
11 libraries detected
This extension does not define a Content Security Policy. A CSP helps prevent XSS and code injection attacks.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
1110 indicators of compromise found