Is "Mask Network" on Firefox Add-ons Safe to Install?
Encrypt your posts & chats on You-Know-Where. Allow only your friends to decrypt. Mask Network is a portal to the new, open internet. With Mask Network, you can send encrypted posts to your friends, participate in cryptocurrency lucky-draws, and share encrypted files on the platforms you are already using. Now #OwnYourData and enjoy financial autonomy across mainstream social network sites through Mask Network. All you need to do is to go through the set up guide and you can use it immediately! Mask Network is a free software and we are willing to take any code audit from anyone. We do not and will never store any of your personal data! More info on Mask.io
Risk Assessment
Pending0 security findings detected across all analyzers
Firefox extension requesting 8 permissions
No Threats Detected
This extension passed all security checks
About This Extension
No Findings
All security checks passed
AI Security Report
AI Security Analysis: Mask Network
Analysis generated: 2025-12-11T18:06:56+13:00
Model: gemini-3-pro-preview
Quick Facts
| Property | Value |
|---|---|
| UUID | 0188c2c7-7eab-5a94-b05a-a6a6a28f0b8f |
| Type | firefox |
| Version | |
| Users | 188 |
| Risk Score | 100.0/100 (CRITICAL) |
| Malware Detected | ⚠️ Yes |
| Secrets Exposed | ✅ No |
| Critical Vulns | ✅ No |
AI Analysis
Executive Summary
The "Mask Network" extension (UUID: 0188c2c7-7eab-5a94-b05a-a6a6a28f0b8f) presents a CRITICAL security risk. The analysis indicates a high probability that this is a malicious clone or an insecurely packaged development build, evidenced by an extremely low user count (188) compared to the legitimate Mask Network software. The extension contains over 1,400 high-severity indicators, including signatures for system command execution, file manipulation, and obfuscated code. Immediate removal is recommended.
Threat Assessment
The security posture of this extension is critically compromised. The assessment highlights three primary threat vectors:
- Potential Imposter/Malware Distribution: The legitimate Mask Network is a widely used Web3 privacy tool. A user count of only 188 for a "Mask Network" extension strongly suggests this is a fake instance designed to deceive users. The unverified publisher status further supports this conclusion.
- Remote Code Execution (RCE) Indicators: The presence of
postinstall_system_command,postinstall_file_download, andpostinstall_file_manipulationsignatures is highly alarming. In a browser extension context, these often indicate attempts to break out of the browser sandbox, download external payloads, or execute arbitrary commands on the host operating system. - Supply Chain/Dependency Risk: The sheer volume of findings (18,000+) suggests the developer may have bundled an entire development environment (including
node_modulesand build scripts) into the production extension. This dramatically increases the attack surface, potentially exposing the user to vulnerabilities present in development dependencies that should never reach a production environment.
Risk Justification
The Risk Score of 100.0/100 is JUSTIFIED.
- Severity of Capabilities: The detected capabilities (System Command Execution, File Download, Obfuscation) represent the highest tier of threat for a browser extension.
- Volume of Indicators: 1,494 High-Severity findings is an exceptionally high number, indicating systemic security failures or intentional malicious design.
- Trust Indicators: The combination of an unverified publisher and a suspiciously low user count for a major brand name creates a near-certainty of illegitimacy.
Key Findings
- System Command Execution (
postinstall_system_command): Multiple instances where the code attempts to execute shell or system commands. This is not standard behavior for a browser extension and indicates a high risk of malware. - Arbitrary File Download (
postinstall_file_download): The extension contains logic to download files from the network and save them to the disk, a common behavior of "dropper" malware. - Code Obfuscation (
postinstall_obfuscation): The presence of obfuscated code within post-install routines suggests an attempt to hide malicious logic from analysis. - Insecure Data Storage (
LocalStorageShouldNotBeUsed): The extension appears to use LocalStorage for sensitive data. For a Web3/Crypto extension, this is a critical vulnerability as LocalStorage is easily accessible to other scripts and lacks encryption. - Credential Exposure Risks (
credential_env_files): The scanner detected files or patterns associated with environment variables, which may contain hardcoded secrets or API keys.
Recommendations
- IMMEDIATE REMOVAL: Uninstall this extension from all browsers immediately.
- Endpoint Scan: Run a full anti-malware scan on any machine where this extension was installed, specifically looking for persistence mechanisms (scheduled tasks, startup items) due to the
postinstallindicators. - Credential Rotation: If any cryptocurrency wallets or sensitive accounts were accessed while this extension was active, consider those credentials compromised. Transfer funds to new wallets and change passwords immediately.
- Blocklist: Administrators should add this specific Extension UUID (
0188c2c7-7eab-5a94-b05a-a6a6a28f0b8f) to the organization's browser blocklist.
Mitigation Strategies
Given the Risk Score of 100 and the nature of the findings, there are no safe mitigation strategies for using this specific version of the extension in a production environment.
If this extension is required for malware analysis research only:
- Isolation: Run exclusively inside a disposable, non-networked Virtual Machine (VM) or a specialized malware sandbox.
- Network Monitoring: If network access is required for analysis, strictly monitor and log all outbound traffic, as the
postinstall_network_communicationfindings suggest it will attempt to contact C2 (Command and Control) servers.
Confidence Assessment
Confidence Level: 80%
I am highly confident in the assessment that this extension is dangerous. The convergence of "Imposter" indicators (low users, unverified dev) with "Malware" indicators (system commands, obfuscation) creates a strong signal.
- Caveat: There is a slight possibility (20%) that this is a legitimate but incompetently packaged developer build where build-tools (like
npmscripts) were accidentally included in the final package. However, even in that scenario, the security risk remains Critical due to the exposure of dangerous functions.
Disclaimer
This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace