Version 1.2.1 View in Chrome Web Store
The extension has a relatively small user base of 3,000 users and a moderate rating of 3.9 stars from only 27 reviews, indicating limited community validation. The developer is identified only by a Blogspot URL rather than a verified company or established developer profile, which raises questions about accountability and legitimacy. The lack of a clear description makes it difficult to understand the extension's intended purpose and justify its extensive permissions.
This extension exhibits extremely concerning permission overreach for what appears to be a JavaScript debugging tool. It requests virtually every available Chrome permission, including highly sensitive ones like debugger access, proxy control, privacy settings modification, and the ability to manage other extensions. The combination of webRequest and webRequestBlocking permissions allows complete interception and modification of all web traffic. The Content Security Policy permits unsafe JavaScript evaluation, creating additional attack vectors. The use of Manifest V2 provides fewer security protections than the current standard.
Do not install this extension under any circumstances. If you absolutely must use it for development purposes, create a completely isolated Chrome profile with no personal data, disable sync, and use it only on non-sensitive websites. Consider alternative JavaScript debugging tools with more reasonable permission requests. The extensive permissions combined with unclear purpose and limited developer accountability make this extension unsuitable for general use.
| https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/eval#dont-use-it | https://clients2.google.com/service/update2/crx |
{ "app": { "launch": { "container": "tab", "local_path": "index.html", "manifest_version": 2 } }, "name": "Javascript Object Browser", "icons": { "16": "icon_16.png", "128": "icon_128.png" }, "version": "1.2.1", "update_url": "https://clients2.google.com/service/update2/crx", "description": "Browse through the objects in the default Javascript library and any local or online libraries", "permissions": [ "*://*/*", "activeTab", "alarms", "background", "bookmarks", "browsingData", "chrome://favicon/", "clipboardRead", "clipboardWrite", "contentSettings", "contextMenus", "cookies", "debugger", "fileBrowserHandler", "fontSettings", "geolocation", "history", "idle", "management", "nativeMessaging", "notifications", "pageCapture", "power", "privacy", "proxy", "storage", "system.cpu", "system.display", "system.memory", "system.storage", "tabCapture", "tabs", "topSites", "tts", "ttsEngine", "unlimitedStorage", "webNavigation", "webRequest", "webRequestBlocking" ], "permissions_app": [ "declarativeContent", "desktopCapture", "dns", "downloads", "gcm", "identity", "pushMessaging", "processes" ], "permissions_dev": [ "infobars", "sessions", "signedInDevices", "ledger", "enterprise.platformKeys", "location" ], "manifest_version": 2, "content_security_policy": "script-src 'self' 'unsafe-eval'; script-src 'self' 'unsafe-inline'; object-src 'self'" }
ⓘ CRXaminer has partnered with our friends at Secure Annex to provide additional findings unique to their platform.
Secure Annex also analyzes extensions from other browsers, IDEs, and can continuously monitor.
This extension may not yet be analyzed by Secure Annex.