Is "TabMaster" on Chrome Web Store Safe to Install?

[email protected] · chrome · v1.0.15

TabMaster是一款现代化浏览器扩展,兼容 Chrome/Edge,遵循 Manifest V3 标准。 功能概览 快速搜索、定位并切换标签页 展示所有窗口与标签页,支持按域名或关键词筛选 一键激活或关闭标签页 🚀 核心特色 ⚡ 极速搜索:实时检索所有窗口中的标签页 🗂️ 智能分组:自动按域名归类标签,清晰直观 🎯 快捷操作:轻松激活或关闭目标标签页 🔒 隐私优先:所有数据仅在本地处理 🌐 多浏览器兼容:全面支持 Chrome、Edge ⚙️ 现代架构:基于 Manifest V3 标准,采用 TypeScript 开发 告别繁琐的手动翻找,用 TabMaster 高效管理你的浏览体验! 🚀

Risk Assessment

Analyzed
67.49
out of 100
HIGH

148 security findings detected across all analyzers

Severity Breakdown

0
Critical
0
High
122
Medium
26
Low
0
Info

Finding Categories

2
Network
111
IoC Indicators

YARA Rules Matched

9 rules(26 hits)
postinstall file manipulation postinstall persistence mechanism NoUseWeakRandom postinstall system command postinstall crypto operations postinstall file download postinstall network communication postinstall environment access postinstall obfuscation

About This Extension

TabMaster是一款现代化浏览器扩展,兼容 Chrome/Edge,遵循 Manifest V3 标准。 功能概览 快速搜索、定位并切换标签页 展示所有窗口与标签页,支持按域名或关键词筛选 一键激活或关闭标签页 🚀 核心特色 ⚡ 极速搜索:实时检索所有窗口中的标签页 🗂️ 智能分组:自动按域名归类标签,清晰直观 🎯 快捷操作:轻松激活或关闭目标标签页 🔒 隐私优先:所有数据仅在本地处理 🌐 多浏览器兼容:全面支持 Chrome、Edge ⚙️ 现代架构:基于 Manifest V3 标准,采用 TypeScript 开发 告别繁琐的手动翻找,用 TabMaster 高效管理你的浏览体验! 🚀

Detailed Findings

29 total

YARA Rule Matches

9 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
7
IP Addresses
3
Domains
101
Strings
111

All Indicators · 111

Domain
detected Domain: google.com

XIOC detected Domain: google.com

extracted_from_files

Domain
detected Domain: sl.call

XIOC detected Domain: sl.call

extracted_from_files

IP
detected IP: ea::

XIOC detected IP: ea::

extracted_from_files

URL
detected URL: http://www.w3.org/2000/svg

XIOC detected URL: http://www.w3.org/2000/svg

extracted_from_files

URL
detected URL: http://www.w3.org/1998/Math/MathML

XIOC detected URL: http://www.w3.org/1998/Math/MathML

extracted_from_files

URL
detected URL: https://clients2.google.com/service/update2/crx

XIOC detected URL: https://clients2.google.com/service/update2/crx

extracted_from_files

URL
detected URL: https://react.dev/errors/

XIOC detected URL: https://react.dev/errors/

extracted_from_files

URL
detected URL: http://www.w3.org/1999/xlink

XIOC detected URL: http://www.w3.org/1999/xlink

extracted_from_files

Domain
detected Domain: window.top

XIOC detected Domain: window.top

extracted_from_files

Domain
detected Domain: d.runtime.id

XIOC detected Domain: d.runtime.id

extracted_from_files

Domain
detected Domain: this.locationwatcher.run

XIOC detected Domain: this.locationwatcher.run

extracted_from_files

Domain
detected Domain: clients2.google.com

XIOC detected Domain: clients2.google.com

extracted_from_files

Domain
detected Domain: manifest.open

XIOC detected Domain: manifest.open

extracted_from_files

URL
detected URL: https://api.isoyu.com/gy/api.php

XIOC detected URL: https://api.isoyu.com/gy/api.php

extracted_from_files

URL
detected URL: https://qzone.qq.com/gy/upload/upfile_3352783_1477652237.jpg

XIOC detected URL: https://qzone.qq.com/gy/upload/upfile_3352783_1477652237.jpg

extracted_from_files

Domain
detected Domain: y.data

XIOC detected Domain: y.data

extracted_from_files

Domain
detected Domain: e.target

XIOC detected Domain: e.target

extracted_from_files

Domain
detected Domain: n.data

XIOC detected Domain: n.data

extracted_from_files

Domain
detected Domain: u.media

XIOC detected Domain: u.media

extracted_from_files

Domain
detected Domain: this.next

XIOC detected Domain: this.next

extracted_from_files

Domain
detected Domain: dl.storage

XIOC detected Domain: dl.storage

extracted_from_files

Domain
detected Domain: i.data

XIOC detected Domain: i.data

extracted_from_files

Domain
detected Domain: e.tab

XIOC detected Domain: e.tab

extracted_from_files

Domain
detected Domain: i.memoizedprops.style

XIOC detected Domain: i.memoizedprops.style

extracted_from_files

Domain
detected Domain: n.id

XIOC detected Domain: n.id

extracted_from_files

Domain
detected Domain: b.top

XIOC detected Domain: b.top

extracted_from_files

Domain
detected Domain: ha.next

XIOC detected Domain: ha.next

extracted_from_files

Domain
detected Domain: r.target

XIOC detected Domain: r.target

extracted_from_files

Domain
detected Domain: q.target

XIOC detected Domain: q.target

extracted_from_files

Domain
detected Domain: y.next

XIOC detected Domain: y.next

extracted_from_files

Domain
detected Domain: u.call

XIOC detected Domain: u.call

extracted_from_files

Domain
detected Domain: u.data

XIOC detected Domain: u.data

extracted_from_files

Domain
detected Domain: u.compare

XIOC detected Domain: u.compare

extracted_from_files

Domain
detected Domain: c.data

XIOC detected Domain: c.data

extracted_from_files

Domain
detected Domain: a.is

XIOC detected Domain: a.is

extracted_from_files

Domain
detected Domain: u.property

XIOC detected Domain: u.property

extracted_from_files

Domain
detected Domain: n.events

XIOC detected Domain: n.events

extracted_from_files

Domain
detected Domain: ml.next

XIOC detected Domain: ml.next

extracted_from_files

Domain
detected Domain: a.data.map

XIOC detected Domain: a.data.map

extracted_from_files

Domain
detected Domain: o.next

XIOC detected Domain: o.next

extracted_from_files

Domain
detected Domain: a.next

XIOC detected Domain: a.next

extracted_from_files

Domain
detected Domain: e.data

XIOC detected Domain: e.data

extracted_from_files

Domain
detected Domain: object.prototype.tostring.call

XIOC detected Domain: object.prototype.tostring.call

extracted_from_files

Domain
detected Domain: n.next

XIOC detected Domain: n.next

extracted_from_files

Domain
detected Domain: u.next

XIOC detected Domain: u.next

extracted_from_files

Domain
detected Domain: i.next

XIOC detected Domain: i.next

extracted_from_files

Domain
detected Domain: g.next

XIOC detected Domain: g.next

extracted_from_files

Domain
detected Domain: q.call

XIOC detected Domain: q.call

extracted_from_files

Domain
detected Domain: m.next

XIOC detected Domain: m.next

extracted_from_files

Domain
detected Domain: ul.next

XIOC detected Domain: ul.next

extracted_from_files

Domain
detected Domain: t.target

XIOC detected Domain: t.target

extracted_from_files

Domain
detected Domain: e.next

XIOC detected Domain: e.next

extracted_from_files

Domain
detected Domain: f.next

XIOC detected Domain: f.next

extracted_from_files

Domain
detected Domain: c.next

XIOC detected Domain: c.next

extracted_from_files

Domain
detected Domain: l.next

XIOC detected Domain: l.next

extracted_from_files

Domain
detected Domain: nt.next

XIOC detected Domain: nt.next

extracted_from_files

Domain
detected Domain: t.next

XIOC detected Domain: t.next

extracted_from_files

Domain
detected Domain: u.name

XIOC detected Domain: u.name

extracted_from_files

Domain
detected Domain: e.name

XIOC detected Domain: e.name

extracted_from_files

Domain
detected Domain: this.target

XIOC detected Domain: this.target

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: l.data

XIOC detected Domain: l.data

extracted_from_files

Domain
detected Domain: t.data

XIOC detected Domain: t.data

extracted_from_files

Domain
detected Domain: object.is

XIOC detected Domain: object.is

extracted_from_files

Domain
detected Domain: l.name

XIOC detected Domain: l.name

extracted_from_files

Domain
detected Domain: gn.call

XIOC detected Domain: gn.call

extracted_from_files

Domain
detected Domain: e.call

XIOC detected Domain: e.call

extracted_from_files

Domain
detected Domain: l.call

XIOC detected Domain: l.call

extracted_from_files

Domain
detected Domain: n.call

XIOC detected Domain: n.call

extracted_from_files

Domain
detected Domain: l.style

XIOC detected Domain: l.style

extracted_from_files

Domain
detected Domain: l.target

XIOC detected Domain: l.target

extracted_from_files

Domain
detected Domain: vl.call

XIOC detected Domain: vl.call

extracted_from_files

Domain
detected Domain: s.id

XIOC detected Domain: s.id

extracted_from_files

Domain
detected Domain: performance.now

XIOC detected Domain: performance.now

extracted_from_files

Domain
detected Domain: c.now

XIOC detected Domain: c.now

extracted_from_files

Domain
detected Domain: w.now

XIOC detected Domain: w.now

extracted_from_files

Domain
detected Domain: t.as

XIOC detected Domain: t.as

extracted_from_files

Domain
detected Domain: t.media

XIOC detected Domain: t.media

extracted_from_files

Domain
detected Domain: y.id

XIOC detected Domain: y.id

extracted_from_files

Domain
detected Domain: react.dev

XIOC detected Domain: react.dev

extracted_from_files

Domain
detected Domain: www.w3.org

XIOC detected Domain: www.w3.org

extracted_from_files

Domain
detected Domain: object.prototype.hasownproperty.call

XIOC detected Domain: object.prototype.hasownproperty.call

extracted_from_files

Domain
detected Domain: n.style

XIOC detected Domain: n.style

extracted_from_files

Domain
detected Domain: s.next

XIOC detected Domain: s.next

extracted_from_files

Domain
detected Domain: a.call

XIOC detected Domain: a.call

extracted_from_files

Domain
detected Domain: e.id

XIOC detected Domain: e.id

extracted_from_files

Domain
detected Domain: l.id

XIOC detected Domain: l.id

extracted_from_files

Domain
detected Domain: r.id

XIOC detected Domain: r.id

extracted_from_files

Domain
detected Domain: d.id

XIOC detected Domain: d.id

extracted_from_files

Domain
detected Domain: s.map

XIOC detected Domain: s.map

extracted_from_files

Domain
detected Domain: k.map

XIOC detected Domain: k.map

extracted_from_files

Domain
detected Domain: b.map

XIOC detected Domain: b.map

extracted_from_files

Domain
detected Domain: a.name

XIOC detected Domain: a.name

extracted_from_files

Domain
detected Domain: w.map

XIOC detected Domain: w.map

extracted_from_files

Domain
detected Domain: v.windows

XIOC detected Domain: v.windows

extracted_from_files

Domain
detected Domain: s.data

XIOC detected Domain: s.data

extracted_from_files

Domain
detected Domain: l.map

XIOC detected Domain: l.map

extracted_from_files

Domain
detected Domain: z.id

XIOC detected Domain: z.id

extracted_from_files

Domain
detected Domain: j.id

XIOC detected Domain: j.id

extracted_from_files

Domain
detected Domain: o.data

XIOC detected Domain: o.data

extracted_from_files

Domain
detected Domain: yeah.net

XIOC detected Domain: yeah.net

extracted_from_files

Domain
detected Domain: 404.baobeihuijia.com

XIOC detected Domain: 404.baobeihuijia.com

extracted_from_files

Domain
detected Domain: t.name

XIOC detected Domain: t.name

extracted_from_files

Domain
detected Domain: t.sex

XIOC detected Domain: t.sex

extracted_from_files

Domain
detected Domain: x.current.click

XIOC detected Domain: x.current.click

extracted_from_files

Domain
detected Domain: v.map

XIOC detected Domain: v.map

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

IP
detected IP: ed::

XIOC detected IP: ed::

extracted_from_files

Domain
detected Domain: api.isoyu.com

XIOC detected Domain: api.isoyu.com

extracted_from_files

Domain
detected Domain: globalthis.chrome

XIOC detected Domain: globalthis.chrome

extracted_from_files

Domain
detected Domain: qzone.qq.com

XIOC detected Domain: qzone.qq.com

extracted_from_files

Security Analysis Summary

Security Analysis Overview

TabMaster is a Chrome Web Store extension published by [email protected]. Version 1.0.15 has been analyzed by the Risky Plugins security platform, receiving a risk score of 67.49/100 (HIGH risk) based on 148 security findings.

Risk Assessment

This extension presents high security risk. Significant concerns were identified during analysis. It is not recommended for use in sensitive or production environments without thorough review.

Findings Breakdown

  • Medium: 122 finding(s)
  • Low: 26 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

TabMaster is published by [email protected] on the Chrome Web Store marketplace. The extension has approximately 7 users.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions