CRX aminer
Extension icon

Temple Wallet

Version 2.0.27 View in Chrome Web Store

Last scanned: about 3 hours ago

Extension Details

Rating: 4.2 ★ (59 ratings)
Users: 100,000

Context-Aware Verdict

HIGH
Overall Risk
Trust Factors:

Temple Wallet appears to be a cryptocurrency wallet extension with 100,000 users and a decent 4.2-star rating from 59 reviews. However, the lack of clear developer information and company details reduces trustworthiness. The extension's purpose as a crypto wallet does justify some of its more invasive permissions, but the implementation raises security concerns.

Key Concerns:

The extension has extremely broad content script injection capabilities across all websites, which is excessive even for a wallet application. The unsafe WebAssembly execution policy creates potential attack vectors for malicious code execution. The clipboardWrite permission, while useful for copying wallet addresses, could be misused to replace copied cryptocurrency addresses with attacker-controlled ones. The localhost host permissions suggest development/testing functionality that shouldn't be present in production releases.

The combination of unlimited storage, broad web access, and unsafe code execution creates a high-risk profile that could be exploited if the extension is compromised or contains malicious code.

Recommendations:

Consider running this extension in a separate Chrome profile dedicated to cryptocurrency activities only. Regularly monitor clipboard contents when copying sensitive information like wallet addresses. Keep the extension updated and consider switching to hardware wallets for significant cryptocurrency holdings. Review the extension's network activity and be cautious about which websites you visit while the extension is active.

Findings

HIGH
Broad Content Script Injection
This extension can inject scripts into any website. This means it could potentially read sensitive data, modify website content, or steal credentials.
HIGH
High-Risk Permission: clipboardWrite
This extension has the clipboardWrite permission. Can modify clipboard content. This could potentially be used maliciously to compromise security or privacy.
HIGH
Unsafe WebAssembly Execution
This extension's Content Security Policy allows 'wasm-unsafe-eval', which permits potentially dangerous WebAssembly code execution. This could be used to hide malicious code or perform CPU-intensive operations.
MEDIUM
Medium-Risk Permission: activeTab
This extension has the activeTab permission. Can access the active tab when clicking the extension icon.
MEDIUM
Medium-Risk Permission: storage
This extension has the storage permission. Can store data locally.
MEDIUM
Medium-Risk Permission: unlimitedStorage
This extension has the unlimitedStorage permission. Can store unlimited data locally.