Version 1.2.1 View in Chrome Web Store
The extension has a relatively small user base of 3,000 users and a modest rating of 3.9 stars from only 27 reviews, indicating limited community validation. The developer appears to be an individual blogger rather than an established company, which raises questions about ongoing support and security practices. The lack of recent update information and minimal description provided are additional red flags.
This extension exhibits extremely concerning permission overreach for a JavaScript object browser tool. It requests virtually every available Chrome permission, including highly sensitive ones like debugger access, proxy control, privacy settings modification, and the ability to manage other extensions. The combination of webRequest and webRequestBlocking permissions allows complete interception and modification of web traffic. The Content Security Policy permits unsafe JavaScript evaluation, creating additional attack vectors. Most critically, these extensive permissions are completely unnecessary for a JavaScript debugging tool, suggesting potential malicious intent or extremely poor security practices.
Do not install this extension under any circumstances. If JavaScript object browsing functionality is needed, seek alternatives from reputable developers with appropriate, limited permissions. The permission set suggests this could be malware disguised as a development tool. If you must use debugging tools, consider browser built-in developer tools or well-established extensions from verified developers with transparent permission usage and strong community backing.
| https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/eval#dont-use-it | https://clients2.google.com/service/update2/crx |
{ "app": { "launch": { "container": "tab", "local_path": "index.html", "manifest_version": 2 } }, "name": "Javascript Object Browser", "icons": { "16": "icon_16.png", "128": "icon_128.png" }, "version": "1.2.1", "update_url": "https://clients2.google.com/service/update2/crx", "description": "Browse through the objects in the default Javascript library and any local or online libraries", "permissions": [ "*://*/*", "activeTab", "alarms", "background", "bookmarks", "browsingData", "chrome://favicon/", "clipboardRead", "clipboardWrite", "contentSettings", "contextMenus", "cookies", "debugger", "fileBrowserHandler", "fontSettings", "geolocation", "history", "idle", "management", "nativeMessaging", "notifications", "pageCapture", "power", "privacy", "proxy", "storage", "system.cpu", "system.display", "system.memory", "system.storage", "tabCapture", "tabs", "topSites", "tts", "ttsEngine", "unlimitedStorage", "webNavigation", "webRequest", "webRequestBlocking" ], "permissions_app": [ "declarativeContent", "desktopCapture", "dns", "downloads", "gcm", "identity", "pushMessaging", "processes" ], "permissions_dev": [ "infobars", "sessions", "signedInDevices", "ledger", "enterprise.platformKeys", "location" ], "manifest_version": 2, "content_security_policy": "script-src 'self' 'unsafe-eval'; script-src 'self' 'unsafe-inline'; object-src 'self'" }
ⓘ CRXaminer has partnered with our friends at Secure Annex to provide additional findings unique to their platform.
Secure Annex also analyzes extensions from other browsers, IDEs, and can continuously monitor.
This extension may not yet be analyzed by Secure Annex.