CRX aminer
Extension icon

RingCentral App Connect - BETA

Version 1.7.10 View in Chrome Web Store

Last scanned: about 8 hours ago

Extension Details

Rating: 3.0 ★ (1 rating)
Users: 221

Context-Aware Verdict

HIGH
Overall Risk
Trust Factors:

The extension has very limited adoption with only 221 users and a single 3.0-star rating, indicating minimal community validation. The BETA designation suggests it's still in development and may contain bugs or incomplete security measures. The lack of detailed developer information and company reputation data raises additional concerns about accountability and trustworthiness.

Concerns:

The extension's broad content script injection capability across all URLs is particularly concerning for a business communication tool, as it could access sensitive data on any website. The unsafe WebAssembly execution policy creates potential for hidden malicious code. The tabs permission allows extensive browser manipulation beyond what would typically be necessary for a RingCentral integration. The combination of unlimited storage with broad web access could enable large-scale data collection and exfiltration.

Recommendations:

Given the high risk profile, install this extension only in a separate Chrome profile dedicated to RingCentral usage. Avoid using this profile for sensitive activities like banking or accessing confidential business systems. Monitor the extension's behavior closely and consider whether the BETA functionality is essential enough to justify the security risks. Wait for a stable release with better security practices if possible, or explore alternative RingCentral integration methods that don't require such broad permissions.

Findings

HIGH
Broad Content Script Injection
This extension can inject scripts into any website. This means it could potentially read sensitive data, modify website content, or steal credentials.
HIGH
High-Risk Permission: tabs
This extension has the tabs permission. Can access browser tab information and manipulate tabs. This could potentially be used maliciously to compromise security or privacy.
HIGH
Unsafe WebAssembly Execution
This extension's Content Security Policy allows 'wasm-unsafe-eval', which permits potentially dangerous WebAssembly code execution. This could be used to hide malicious code or perform CPU-intensive operations.
MEDIUM
Medium-Risk Permission: notifications
This extension has the notifications permission. Can show notifications.
MEDIUM
Medium-Risk Permission: storage
This extension has the storage permission. Can store data locally.
MEDIUM
Medium-Risk Permission: unlimitedStorage
This extension has the unlimitedStorage permission. Can store unlimited data locally.