Wordtune: AI Paraphrasing and Grammar ToolSecurity Analysis

Chromev9.19.0MV3February 18, 2026 at 11:44 AM
Potentially unsafe

This extension shows concerning patterns that may indicate risky behavior. Proceed with caution.

5.8MEDIUM
5.8 MEDIUMRaw: 8.9

This extension shows some risk signals that are common in legitimate extensions but worth reviewing. Check the details below.

Based on 15 permissions including high-risk ones, 174 code findings, 3 dangerous combinations.

Trust Signals(6.3/10)

Users
1.0M
Rating
4.9(2K reviews)
Developer
AI21 LABS, INC.
Status
Featured

Dangerous Combinations(3)

HIGHCookie access + external network

Extension has cookie access and sends data to external servers — potential session token theft.

cookies+external network request
CRITICALClipboard read + external communication

Extension reads clipboard and communicates externally — potential credential or crypto address theft.

clipboardRead+external network request
CRITICALAll-sites access + keyboard capture

Extension has access to all sites and captures keyboard input — behavior consistent with a keylogger.

<all_urls>+keylogger_pattern
Permissions
7.5/10
Code
10.0/10
Combinations
10.0/10
Manifest/CSP
7.5/10

Permissions(13 analyzed)

Code Findings(20 patterns, 174 total)

Libraries(7 detected)

7 libraries detected

Content Security Policy

CSP Present(1 issue)
LOW
object-srcobject-src not restricted

object-src is not set to 'none'. Plugins like Flash can be embedded, which may allow code execution.

Manifest Analysis(7 findings)

HIGH
web_accessible_resourcesJS files exposed to web pages

JavaScript files are accessible to ALL websites. Any page can load and interact with these scripts, enabling web→extension attacks.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

MEDIUM
web_accessible_resources.matchesOverly broad match patterns

Web-accessible resources use <all_urls> or wildcard patterns, exposing resources to every website.

LOW
externally_connectableExternal messaging enabled

Extension accepts messages from 2 external pattern(s). Verify these are trusted origins.

MEDIUM
content_scriptsContent script injected on all URLs

Content script matches <all_urls>, executing on every website the user visits.

MEDIUM
content_scriptsContent script injected on all URLs

Content script matches <all_urls>, executing on every website the user visits.

External Domains(36)

${n${pa127.0.0.1api.eu.amplitude.comapi.lab.amplitude.comapi.lab.eu.amplitude.comapi.wordtune.comapi.wordtune.com${rapi2.amplitude.comapp.wordtune.comchromium-extension.wordtune.comdev.apollodata.comdocs.apollostack.comflag.lab.amplitude.comflag.lab.eu.amplitude.comgithub.comgmail.comhtml.spec.whatwg.orglocalhostlodash.commaccabi-dent.comnpms.ioopenjsf.orgreactjs.orgreactrouter.comstatic-design-system.wordtune.comsupport.wordtune.comunderscorejs.orgwordtune-productionba9aa0eb.firebaseio.comwordtune.comwww.ai21.comwww.apache.orgwww.docs.developers.amplitude.comwww.npmjs.comwww.wordtune.comwxt.dev

Indicators of Compromise

83 indicators of compromise found

File Statistics

143
Total Files
105
JS Files
10.4 MB
Total Size

Other Scanned Extensions