This extension raises significant trust concerns. With only 756 users and a 0.0 rating with no reviews, it lacks community validation. The absence of clear author and developer information makes it impossible to verify the publisher's reputation or legitimacy. The name "YonMate RPA" suggests robotic process automation functionality, but without a proper description, users cannot understand what the extension actually does.
The extension requests an excessive array of high-risk permissions that far exceed what most legitimate extensions require. The combination of cookies, tabs, webNavigation, and scripting permissions with unrestricted host access creates a perfect surveillance toolkit. The nativeMessaging permission allows communication with external applications, potentially bypassing browser security. The unsafe WebAssembly execution policy is particularly concerning as it could hide malicious code. For an RPA tool, these permissions might be technically necessary, but the lack of transparency about functionality makes verification impossible.
Do not install this extension due to its critical risk level and lack of trustworthy indicators. If RPA functionality is genuinely needed, research established alternatives with clear documentation, verified publishers, and positive user feedback. If you must use this specific extension, create a completely isolated Chrome profile with no access to personal accounts, sensitive data, or important websites. Monitor system behavior closely and remove immediately if any suspicious activity occurs.
| https://html2canvas.hertzen.com | https://hertzen.com | |
| http://www.w3.org/2000/svg | https://github.com/uuidjs/uuid#getrandomvalues-not-supported | |
| https://clients2.google.com/service/update2/crx | https://ntp.msn.cn | |
| https://devtools.azureedge.net |
{ "name": "__MSG_name__", "icons": { "16": "icons/icon.png", "24": "icons/icon.png", "48": "icons/icon.png", "64": "icons/icon.png", "128": "icons/icon.png", "256": "icons/icon.png" }, "action": { "default_icon": "icons/icon.png", "default_popup": "popup/popup.html" }, "author": "用友网络科技股份有限公司", "version": "8.2025.1020.1037", "background": { "type": "module", "service_worker": "service_worker.js" }, "short_name": "__MSG_short_name__", "update_url": "https://clients2.google.com/service/update2/crx", "description": "__MSG_description__", "permissions": [ "cookies", "tabs", "nativeMessaging", "webNavigation", "scripting", "alarms", "storage" ], "default_locale": "en", "content_scripts": [ { "js": [ "content_script.js" ], "run_at": "document_start", "matches": [ "<all_urls>" ], "all_frames": true, "match_about_blank": true } ], "offline_enabled": true, "host_permissions": [ "<all_urls>" ], "manifest_version": 3, "minimum_chrome_version": "88", "content_security_policy": { "extension_pages": "script-src 'self' 'wasm-unsafe-eval'; object-src 'self'" }, "web_accessible_resources": [ { "matches": [ "*://*/*" ], "resources": [ "js/*", "css/*", "scripts/*" ] } ] }
ⓘ CRXaminer has partnered with our friends at Secure Annex to provide additional findings unique to their platform.
Secure Annex also analyzes extensions from other browsers, IDEs, and can continuously monitor.
This extension may not yet be analyzed by Secure Annex.