CRX aminer
Extension icon

JPEG XL Viewer

Version 0.3.0 View in Chrome Web Store

Last scanned: about 24 hours ago

Extension Details

Rating: 4.4 ★ (28 ratings)
Users: 4,000

Context-Aware Verdict

HIGH
Risk Level
Trust Factors: The extension has a reasonable user base of 4,000 downloads and a solid 4.4-star rating from 28 reviews, suggesting users find it functional. The specific purpose of viewing JPEG XL files is legitimate and addresses a real need since this format isn't natively supported by Chrome. However, the lack of developer information raises some transparency concerns.
Concerns: The extension's permissions are extremely broad for its stated purpose. Host permissions for all URLs and content script injection across all websites are excessive for a simple image viewer. The unsafe WebAssembly execution policy is particularly concerning as it could hide malicious code. A JPEG XL viewer should theoretically only need to activate on pages containing these specific image files, not have blanket access to all websites and the ability to inject scripts everywhere.
Recommendations: Given the high-risk permissions that seem disproportionate to the extension's function, consider running this in a separate Chrome profile if you need JPEG XL viewing capabilities. Monitor your browsing activity for any unusual behavior. Look for alternative JPEG XL viewers with more restrictive permissions, or consider using standalone image viewing software instead. The WebAssembly execution capability, while potentially necessary for image processing, adds significant risk that warrants caution.

Security Analysis

HIGH
Overall Risk
Based on 3 total findings, ranked without considering overall context, including 3 high-risk and 0 medium-risk findings.
HIGH
Broad Content Script Injection
This extension can inject scripts into any website. This means it could potentially read sensitive data, modify website content, or steal credentials.
HIGH
Broad Host Permissions
This extension has broad host permissions allowing it to access many or all websites. This could potentially be used to steal sensitive data or track browsing activity.
HIGH
Unsafe WebAssembly Execution
This extension's Content Security Policy allows 'wasm-unsafe-eval', which permits potentially dangerous WebAssembly code execution. This could be used to hide malicious code or perform CPU-intensive operations.