CRX aminer
Extension icon

JPEG XL Viewer

Version 0.3.0 View in Chrome Web Store

Last scanned: about 16 hours ago

Extension Details

Rating: 4.4 ★ (28 ratings)
Users: 5,000

Context-Aware Verdict

HIGH
Overall Risk
Trust Factors: The extension has a decent user base of 5,000 downloads and a solid 4.4-star rating from 28 reviews, suggesting users find it functional. The specific purpose of viewing JPEG XL files is legitimate and addresses a real need since native browser support for this format is limited. However, the lack of developer information and company details reduces transparency and accountability.
Concerns: The extension's permissions are extremely broad relative to its stated purpose. For a simple image viewer, requesting access to all websites and the ability to inject content scripts everywhere is excessive and concerning. The declarativeNetRequest permission combined with all_urls access creates potential for network manipulation. The unsafe WebAssembly execution policy, while possibly necessary for image processing, introduces additional security risks by allowing potentially obfuscated code execution.
Recommendations: Given the high-risk permissions that seem disproportionate to the extension's functionality, consider running this in a separate Chrome profile to isolate potential security impacts. Before installing, verify if your browser has native JPEG XL support or if there are alternative viewers with more restrictive permissions. If you must use this extension, monitor your browsing activity for any unusual behavior and consider disabling it when not actively viewing JPEG XL files. The broad permissions suggest this extension could access sensitive data across all websites you visit.

Findings

HIGH
Broad Content Script Injection
This extension can inject scripts into any website. This means it could potentially read sensitive data, modify website content, or steal credentials.
HIGH
Broad Host Permissions
This extension has broad host permissions allowing it to access many or all websites. This could potentially be used to steal sensitive data or track browsing activity.
HIGH
Unsafe WebAssembly Execution
This extension's Content Security Policy allows 'wasm-unsafe-eval', which permits potentially dangerous WebAssembly code execution. This could be used to hide malicious code or perform CPU-intensive operations.