CRX aminer
Extension icon

rhwp - HWP 문서 뷰어 & 에디터

Version 0.2.1 View in Chrome Web Store

Last scanned: about 5 hours ago

Extension Details

Rating: 4.9 ★ (231 ratings)
Users: 70,000

Context-Aware Verdict

CRITICAL
Overall Risk
Trust Factors:

The extension has a strong user base of 70,000 users and an excellent rating of 4.9 stars from 231 reviews, suggesting legitimate functionality for HWP document viewing and editing. However, the lack of visible developer information raises transparency concerns. The high rating indicates users find value in the extension's core functionality.

Concerns:

The extension's permission set is extremely broad and concerning for a document viewer. The combination of <all_urls> host permissions with content script injection creates a powerful surveillance capability across all websites. The downloads permission could facilitate data exfiltration, while clipboardWrite enables manipulation of copied content. Most alarming is the 'wasm-unsafe-eval' CSP directive, which allows execution of potentially obfuscated malicious code through WebAssembly. These permissions far exceed what's necessary for document viewing functionality and create multiple attack vectors.

Recommendations:

Given the critical risk level, avoid installing this extension on your primary browser profile. If you must use it for HWP document functionality, create a dedicated Chrome profile with no sensitive browsing activity or stored credentials. Consider using alternative document viewers with more restrictive permissions, or use HWP documents in isolated environments like virtual machines. Monitor your system for unusual network activity if installed, and regularly review your download history and clipboard usage.

Findings

HIGH
Broad Content Script Injection
This extension can inject scripts into any website. This means it could potentially read sensitive data, modify website content, or steal credentials.
HIGH
Broad Host Permissions
This extension has broad host permissions allowing it to access many or all websites. This could potentially be used to steal sensitive data or track browsing activity.
HIGH
High-Risk Permission: clipboardWrite
This extension has the clipboardWrite permission. Can modify clipboard content. This could potentially be used maliciously to compromise security or privacy.
HIGH
High-Risk Permission: downloads
This extension has the downloads permission. Can download files and access download history. This could potentially be used maliciously to compromise security or privacy.
HIGH
Unsafe WebAssembly Execution
This extension's Content Security Policy allows 'wasm-unsafe-eval', which permits potentially dangerous WebAssembly code execution. This could be used to hide malicious code or perform CPU-intensive operations.
MEDIUM
Medium-Risk Permission: activeTab
This extension has the activeTab permission. Can access the active tab when clicking the extension icon.
MEDIUM
Medium-Risk Permission: contextMenus
This extension has the contextMenus permission. Can add items to the context menu.
MEDIUM
Medium-Risk Permission: storage
This extension has the storage permission. Can store data locally.