Version 1.2.1 View in Chrome Web Store
The extension has very low trustworthiness indicators. With only 3,000 users and a modest 3.9-star rating from just 27 reviews, it lacks widespread adoption or strong user validation. The developer appears to be an individual blogger rather than an established company, and the missing description raises immediate red flags about the extension's legitimacy and purpose.
This extension exhibits extremely concerning permission overreach that is completely unjustifiable for a "Javascript Object Browser." It requests virtually every possible Chrome permission, including highly sensitive ones like debugger access, proxy control, privacy settings modification, and the ability to manage other extensions. The combination of webRequest and webRequestBlocking permissions allows complete interception and modification of all web traffic. The Content Security Policy permits unsafe JavaScript evaluation, creating additional attack vectors. Most alarmingly, there's no clear description explaining why such extensive permissions would be necessary for browsing JavaScript objects.
Do not install this extension under any circumstances. The permission set suggests potential malware designed for data theft, system compromise, or malicious traffic manipulation. If you absolutely must test similar functionality, use a completely isolated Chrome profile with no personal data, banking information, or sensitive accounts. Consider reporting this extension to Google for review due to its suspicious permission requests and lack of transparency.
| https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/eval#dont-use-it | https://clients2.google.com/service/update2/crx |
{ "app": { "launch": { "container": "tab", "local_path": "index.html", "manifest_version": 2 } }, "name": "Javascript Object Browser", "icons": { "16": "icon_16.png", "128": "icon_128.png" }, "version": "1.2.1", "update_url": "https://clients2.google.com/service/update2/crx", "description": "Browse through the objects in the default Javascript library and any local or online libraries", "permissions": [ "*://*/*", "activeTab", "alarms", "background", "bookmarks", "browsingData", "chrome://favicon/", "clipboardRead", "clipboardWrite", "contentSettings", "contextMenus", "cookies", "debugger", "fileBrowserHandler", "fontSettings", "geolocation", "history", "idle", "management", "nativeMessaging", "notifications", "pageCapture", "power", "privacy", "proxy", "storage", "system.cpu", "system.display", "system.memory", "system.storage", "tabCapture", "tabs", "topSites", "tts", "ttsEngine", "unlimitedStorage", "webNavigation", "webRequest", "webRequestBlocking" ], "permissions_app": [ "declarativeContent", "desktopCapture", "dns", "downloads", "gcm", "identity", "pushMessaging", "processes" ], "permissions_dev": [ "infobars", "sessions", "signedInDevices", "ledger", "enterprise.platformKeys", "location" ], "manifest_version": 2, "content_security_policy": "script-src 'self' 'unsafe-eval'; script-src 'self' 'unsafe-inline'; object-src 'self'" }
ⓘ CRXaminer has partnered with our friends at Secure Annex to provide additional findings unique to their platform.
Secure Annex also analyzes extensions from other browsers, IDEs, and can continuously monitor.
This extension may not yet be analyzed by Secure Annex.