Starting analysis...
Version 1.2.1 View in Chrome Web Store
The extension has a relatively small user base of 3,000 users with a moderate rating of 3.9 stars from only 27 reviews, indicating limited community validation. The developer uses a Blogspot domain rather than a professional website, which raises questions about legitimacy and long-term support. The lack of a proper description makes it impossible to understand the extension's intended purpose or justify its extensive permissions.
This extension exhibits extremely concerning permission overreach that is completely unjustifiable for a "Javascript Object Browser." It requests virtually every possible Chrome permission including debugger access, proxy control, privacy settings modification, clipboard access, browsing history, cookies, and web request interception. The combination of webRequest and webRequestBlocking permissions allows complete traffic manipulation. The Content Security Policy permits unsafe JavaScript evaluation, creating additional attack vectors. The extensive permissions could enable data theft, traffic hijacking, extension manipulation, and complete browser compromise.
Do not install this extension under any circumstances. The permission set suggests potential malware rather than a legitimate development tool. If you absolutely need JavaScript debugging capabilities, use Chrome's built-in Developer Tools or seek well-established alternatives from reputable developers with transparent functionality descriptions. If already installed, remove immediately and consider running a security scan. The risk-to-benefit ratio is completely unacceptable for any legitimate use case.
| https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/eval#dont-use-it | https://clients2.google.com/service/update2/crx |
{ "app": { "launch": { "container": "tab", "local_path": "index.html", "manifest_version": 2 } }, "name": "Javascript Object Browser", "icons": { "16": "icon_16.png", "128": "icon_128.png" }, "version": "1.2.1", "update_url": "https://clients2.google.com/service/update2/crx", "description": "Browse through the objects in the default Javascript library and any local or online libraries", "permissions": [ "*://*/*", "activeTab", "alarms", "background", "bookmarks", "browsingData", "chrome://favicon/", "clipboardRead", "clipboardWrite", "contentSettings", "contextMenus", "cookies", "debugger", "fileBrowserHandler", "fontSettings", "geolocation", "history", "idle", "management", "nativeMessaging", "notifications", "pageCapture", "power", "privacy", "proxy", "storage", "system.cpu", "system.display", "system.memory", "system.storage", "tabCapture", "tabs", "topSites", "tts", "ttsEngine", "unlimitedStorage", "webNavigation", "webRequest", "webRequestBlocking" ], "permissions_app": [ "declarativeContent", "desktopCapture", "dns", "downloads", "gcm", "identity", "pushMessaging", "processes" ], "permissions_dev": [ "infobars", "sessions", "signedInDevices", "ledger", "enterprise.platformKeys", "location" ], "manifest_version": 2, "content_security_policy": "script-src 'self' 'unsafe-eval'; script-src 'self' 'unsafe-inline'; object-src 'self'" }
ⓘ CRXaminer has partnered with our friends at Secure Annex to provide additional findings unique to their platform.
Secure Annex also analyzes extensions from other browsers, IDEs, and can continuously monitor.
This extension may not yet be analyzed by Secure Annex.