Is "Mask Network" on Firefox Add-ons Safe to Install?

Dimension · firefox · v2.11.4

Encrypt your posts & chats on You-Know-Where. Allow only your friends to decrypt. Mask Network is a portal to the new, open internet. With Mask Network, you can send encrypted posts to your friends, participate in cryptocurrency lucky-draws, and share encrypted files on the platforms you are already using. Now #OwnYourData and enjoy financial autonomy across mainstream social network sites through Mask Network. All you need to do is to go through the set up guide and you can use it immediately! Mask Network is a free software and we are willing to take any code audit from anyone. We do not and will never store any of your personal data! More info on Mask.io

Risk Assessment

Pending
0
out of 100
MINIMAL

0 security findings detected across all analyzers

Firefox extension requesting 8 permissions

No Threats Detected

This extension passed all security checks

About This Extension

Encrypt your posts &amp; chats on You-Know-Where. Allow only your friends to decrypt. Mask Network is a portal to the new, open internet. With Mask Network, you can send encrypted posts to your friends, participate in cryptocurrency lucky-draws, and share encrypted files on the platforms you are already using. Now #OwnYourData and enjoy financial autonomy across mainstream social network sites through Mask Network. All you need to do is to go through the set up guide and you can use it immediately! Mask Network is a free software and we are willing to take any code audit from anyone. We do not and will never store any of your personal data! More info on <a href="https://prod.outgoing.prod.webservices.mozgcp.net/v1/a7fa0cbdcdcff5c69576ac24895fc793a336682dd7029daf2fd2d1f28224554d/http%3A//Mask.io" rel="nofollow">Mask.io</a>

No Findings

All security checks passed

AI Security Report

AI Security Analysis: Mask Network

Analysis generated: 2025-12-11T18:06:56+13:00
Model: gemini-3-pro-preview


Quick Facts

Property Value
UUID 0188c2c7-7eab-5a94-b05a-a6a6a28f0b8f
Type firefox
Version
Users 188
Risk Score 100.0/100 (CRITICAL)
Malware Detected ⚠️ Yes
Secrets Exposed ✅ No
Critical Vulns ✅ No

AI Analysis

Executive Summary

The "Mask Network" extension (UUID: 0188c2c7-7eab-5a94-b05a-a6a6a28f0b8f) presents a CRITICAL security risk. The analysis indicates a high probability that this is a malicious clone or an insecurely packaged development build, evidenced by an extremely low user count (188) compared to the legitimate Mask Network software. The extension contains over 1,400 high-severity indicators, including signatures for system command execution, file manipulation, and obfuscated code. Immediate removal is recommended.

Threat Assessment

The security posture of this extension is critically compromised. The assessment highlights three primary threat vectors:

  1. Potential Imposter/Malware Distribution: The legitimate Mask Network is a widely used Web3 privacy tool. A user count of only 188 for a "Mask Network" extension strongly suggests this is a fake instance designed to deceive users. The unverified publisher status further supports this conclusion.
  2. Remote Code Execution (RCE) Indicators: The presence of postinstall_system_command, postinstall_file_download, and postinstall_file_manipulation signatures is highly alarming. In a browser extension context, these often indicate attempts to break out of the browser sandbox, download external payloads, or execute arbitrary commands on the host operating system.
  3. Supply Chain/Dependency Risk: The sheer volume of findings (18,000+) suggests the developer may have bundled an entire development environment (including node_modules and build scripts) into the production extension. This dramatically increases the attack surface, potentially exposing the user to vulnerabilities present in development dependencies that should never reach a production environment.

Risk Justification

The Risk Score of 100.0/100 is JUSTIFIED.

  • Severity of Capabilities: The detected capabilities (System Command Execution, File Download, Obfuscation) represent the highest tier of threat for a browser extension.
  • Volume of Indicators: 1,494 High-Severity findings is an exceptionally high number, indicating systemic security failures or intentional malicious design.
  • Trust Indicators: The combination of an unverified publisher and a suspiciously low user count for a major brand name creates a near-certainty of illegitimacy.

Key Findings

  • System Command Execution (postinstall_system_command): Multiple instances where the code attempts to execute shell or system commands. This is not standard behavior for a browser extension and indicates a high risk of malware.
  • Arbitrary File Download (postinstall_file_download): The extension contains logic to download files from the network and save them to the disk, a common behavior of "dropper" malware.
  • Code Obfuscation (postinstall_obfuscation): The presence of obfuscated code within post-install routines suggests an attempt to hide malicious logic from analysis.
  • Insecure Data Storage (LocalStorageShouldNotBeUsed): The extension appears to use LocalStorage for sensitive data. For a Web3/Crypto extension, this is a critical vulnerability as LocalStorage is easily accessible to other scripts and lacks encryption.
  • Credential Exposure Risks (credential_env_files): The scanner detected files or patterns associated with environment variables, which may contain hardcoded secrets or API keys.

Recommendations

  1. IMMEDIATE REMOVAL: Uninstall this extension from all browsers immediately.
  2. Endpoint Scan: Run a full anti-malware scan on any machine where this extension was installed, specifically looking for persistence mechanisms (scheduled tasks, startup items) due to the postinstall indicators.
  3. Credential Rotation: If any cryptocurrency wallets or sensitive accounts were accessed while this extension was active, consider those credentials compromised. Transfer funds to new wallets and change passwords immediately.
  4. Blocklist: Administrators should add this specific Extension UUID (0188c2c7-7eab-5a94-b05a-a6a6a28f0b8f) to the organization's browser blocklist.

Mitigation Strategies

Given the Risk Score of 100 and the nature of the findings, there are no safe mitigation strategies for using this specific version of the extension in a production environment.

If this extension is required for malware analysis research only:

  1. Isolation: Run exclusively inside a disposable, non-networked Virtual Machine (VM) or a specialized malware sandbox.
  2. Network Monitoring: If network access is required for analysis, strictly monitor and log all outbound traffic, as the postinstall_network_communication findings suggest it will attempt to contact C2 (Command and Control) servers.

Confidence Assessment

Confidence Level: 80%

I am highly confident in the assessment that this extension is dangerous. The convergence of "Imposter" indicators (low users, unverified dev) with "Malware" indicators (system commands, obfuscation) creates a strong signal.

  • Caveat: There is a slight possibility (20%) that this is a legitimate but incompetently packaged developer build where build-tools (like npm scripts) were accidentally included in the final package. However, even in that scenario, the security risk remains Critical due to the exposure of dangerous functions.

Disclaimer

This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.

Frequently Asked Questions