This extension shows concerning patterns that may indicate risky behavior. Proceed with caution.
This extension shows some risk signals that are common in legitimate extensions but worth reviewing. Check the details below.
Based on 15 permissions including high-risk ones, 174 code findings, 3 dangerous combinations.
Extension has cookie access and sends data to external servers — potential session token theft.
Extension reads clipboard and communicates externally — potential credential or crypto address theft.
Extension has access to all sites and captures keyboard input — behavior consistent with a keylogger.
7 libraries detected
object-src is not set to 'none'. Plugins like Flash can be embedded, which may allow code execution.
JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.
Extension accepts messages from 2 external pattern(s). Verify these are trusted origins.
Content script matches <all_urls>, executing on every website the user visits.
Content script matches <all_urls>, executing on every website the user visits.
83 indicators of compromise found