CRX aminer

Starting analysis...

Extension icon

Video Search Pro

Version 1.3.2 View in Chrome Web Store

Last scanned: 1 day ago | force re-scan

Extension Details

Developer: videosearcherpro.com
Rating: 5.0 ★ (1 rating)
Users: 8,000

Context-Aware Verdict

MEDIUM
Risk Level
Trust Factors:

The extension has very limited trust indicators with only 8,000 users and a single 5-star rating, which is insufficient to establish credibility. The developer domain videosearcherpro.com lacks transparency about the company behind it. The extension's purpose as a "Video Search Pro" tool is vaguely described without clear functionality details.

Concerns:

The primary concern is the broad host permissions that allow access to videosearcherpro.com, which could potentially be exploited for data collection or tracking. While the permission scope is limited to a single domain rather than all websites, this still represents unnecessary access for what appears to be a video search tool. The lack of detailed description makes it difficult to assess whether these permissions are justified for the extension's stated functionality. The minimal user base and single rating provide insufficient community validation.

Recommendations:

Given the medium risk level, consider running this extension in a separate Chrome profile to isolate potential security risks from your main browsing activities. Before installation, research the developer's website and privacy policy to understand data collection practices. Monitor the extension's behavior after installation and remove it if you notice unexpected network activity or performance issues. Consider alternative video search tools from more established developers with better transparency and user validation.

Security Analysis

MEDIUM
Overall Risk
Based on 1 total findings, ranked without considering overall context, including 1 high-risk and 0 medium-risk findings.
HIGH
Broad Host Permissions
This extension has broad host permissions allowing it to access many or all websites. This could potentially be used to steal sensitive data or track browsing activity.