Is "JSaw Puzzle" on Firefox Add-ons Safe to Install?

Raymond Hill · firefox · v1.11

A browser extension to create and solve jigsaw puzzles. The extension can fetch random pictures from different feeds. Currently it can fetch from Wikimedia Commons[1] and Public Domain Pictures[2]. Important: Firefox version 126.0 and below requires that you explicitly grant permissions to be able fetch pictures from the remote servers. For more details, see README at: https://github.com/gorhill/jsawpuzzle#jsaw-puzzle [1] https://commons.wikimedia.org/ [2] https://www.publicdomainpictures.net/

Risk Assessment

Analyzed
56.33
out of 100
MEDIUM

206 security findings detected across all analyzers

Firefox extension requesting 4 permissions

Severity Breakdown

0
Critical
38
High
168
Medium
0
Low
0
Info

Finding Categories

38
Malware Signatures
4
Network
162
IoC Indicators

YARA Rules Matched

8 rules(38 hits)
postinstall network communication postinstall file download postinstall system command NoUseWeakRandom postinstall crypto operations postinstall file manipulation postinstall obfuscation LocalStorageShouldNotBeUsed

Requested Permissions

4 permissions
contextMenus
Low
storage
Low
https://commons.wikimedia.org/*
Low
https://*.publicdomainpictures.net/*
Low

About This Extension

A browser extension to create and solve jigsaw puzzles. The extension can fetch random pictures from different feeds. Currently it can fetch from Wikimedia Commons[1] and Public Domain Pictures[2]. Important: Firefox version 126.0 and below requires that you explicitly grant permissions to be able fetch pictures from the remote servers. For more details, see README at: <a href="https://prod.outgoing.prod.webservices.mozgcp.net/v1/0075c11a1d5e9bf145e7c3580d87b22b29888858656a4611df71de648d54a0b9/https%3A//github.com/gorhill/jsawpuzzle%23jsaw-puzzle" rel="nofollow">https://github.com/gorhill/jsawpuzzle#jsaw-puzzle</a> [1] <a href="https://prod.outgoing.prod.webservices.mozgcp.net/v1/dab7fae3e7111faf2b27cadcb5ab9e08cb7c1dac50d44fdf638b2bbdbc83aea9/https%3A//commons.wikimedia.org/" rel="nofollow">https://commons.wikimedia.org/</a> [2] <a href="https://prod.outgoing.prod.webservices.mozgcp.net/v1/9430cc0c42d3924b687d3650b4601cddabf91e4a4706a9156aae86478b79472b/https%3A//www.publicdomainpictures.net/" rel="nofollow">https://www.publicdomainpictures.net/</a>

Detailed Findings

42 total

YARA Rule Matches

8 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
37
IP Addresses
16
Domains
117
Strings
162

All Indicators · 162

Domain
detected Domain: tile.id

XIOC detected Domain: tile.id

extracted_from_files

Domain
detected Domain: otherside.id

XIOC detected Domain: otherside.id

extracted_from_files

URL
detected URL: https://freesound.org/people/lennartgreen/sounds/566887/

XIOC detected URL: https://freesound.org/people/lennartgreen/sounds/566887/

extracted_from_files

URL
detected URL: https://freesound.org/people/lennartgreen/

XIOC detected URL: https://freesound.org/people/lennartgreen/

extracted_from_files

URL
detected URL: https://paulbourke.net/geometry/polygonmesh/

XIOC detected URL: https://paulbourke.net/geometry/polygonmesh/

extracted_from_files

URL
detected URL: https://paulbourke.net/

XIOC detected URL: https://paulbourke.net/

extracted_from_files

URL
detected URL: https://alienryderflex.com/hsp.html

XIOC detected URL: https://alienryderflex.com/hsp.html

extracted_from_files

URL
detected URL: https://freesound.org/people/schluppipuppie/sounds/12842/

XIOC detected URL: https://freesound.org/people/schluppipuppie/sounds/12842/

extracted_from_files

URL
detected URL: https://freesound.org/people/schluppipuppie/

XIOC detected URL: https://freesound.org/people/schluppipuppie/

extracted_from_files

URL
detected URL: https://freesound.org/people/schluppipuppie/sounds/12843/

XIOC detected URL: https://freesound.org/people/schluppipuppie/sounds/12843/

extracted_from_files

URL
detected URL: https://freesound.org/people/m1rk0/sounds/35103/

XIOC detected URL: https://freesound.org/people/m1rk0/sounds/35103/

extracted_from_files

URL
detected URL: https://freesound.org/people/m1rk0/

XIOC detected URL: https://freesound.org/people/m1rk0/

extracted_from_files

URL
detected URL: https://freesound.org/people/m1rk0/sounds/35104/

XIOC detected URL: https://freesound.org/people/m1rk0/sounds/35104/

extracted_from_files

URL
detected URL: https://freesound.org/people/J.Zazvurek/sounds/60789/

XIOC detected URL: https://freesound.org/people/J.Zazvurek/sounds/60789/

extracted_from_files

URL
detected URL: https://upload.wikimedia.org')

XIOC detected URL: https://upload.wikimedia.org')

extracted_from_files

URL
detected URL: http://adomas.org/javascript-mouse-wheel/

XIOC detected URL: http://adomas.org/javascript-mouse-wheel/

extracted_from_files

URL
detected URL: https://github.com/gorhill/jsawpuzzle

XIOC detected URL: https://github.com/gorhill/jsawpuzzle

extracted_from_files

URL
detected URL: https://www.gnu.org/licenses/

XIOC detected URL: https://www.gnu.org/licenses/

extracted_from_files

URL
detected URL: https://commons.wikimedia.org/wiki/File:Cape_Town_(ZA),_Wale_Street_--_2024_--_3544.jpg

XIOC detected URL: https://commons.wikimedia.org/wiki/File:Cape_Town_(ZA),_Wale_Street_--_2024_--_3544.jpg

extracted_from_files

URL
detected URL: https://www.wikidata.org/wiki/Q34788025

XIOC detected URL: https://www.wikidata.org/wiki/Q34788025

extracted_from_files

URL
detected URL: https://freesound.org/

XIOC detected URL: https://freesound.org/

extracted_from_files

URL
detected URL: https://www.publicdomainpictures.net/view-image.php?image=$

XIOC detected URL: https://www.publicdomainpictures.net/view-image.php?image=$

extracted_from_files

URL
detected URL: https://commons.wikimedia.org/wiki/Commons:Featured_pictures/chronological/$

XIOC detected URL: https://commons.wikimedia.org/wiki/Commons:Featured_pictures/chronological/$

extracted_from_files

URL
detected URL: https://www.mediawiki.org/wiki/Common_thumbnail_sizes

XIOC detected URL: https://www.mediawiki.org/wiki/Common_thumbnail_sizes

extracted_from_files

URL
detected URL: https://commons.wikimedia.org/wiki/Template:Potd/$

XIOC detected URL: https://commons.wikimedia.org/wiki/Template:Potd/$

extracted_from_files

URL
detected URL: https://commons.wikimedia.org/wiki/File:Cape_Town_(ZA),_Wale_Street_--_2024_--_3544.jpg',

XIOC detected URL: https://commons.wikimedia.org/wiki/File:Cape_Town_(ZA),_Wale_Street_--_2024_--_3544.jpg',

extracted_from_files

URL
detected URL: https://upload.wikimedia.org/wikipedia/commons/thumb/b/b2/Cape_Town_%28ZA%29%2C_Wale_Street_--_2024_--_3544.jpg/330px-Cape_Town_%28ZA%29%2C_Wale_Street_--_2024_--_3544.jpg',

XIOC detected URL: https://upload.wikimedia.org/wikipedia/commons/thumb/b/b2/Cape_Town_%28ZA%29%2C_Wale_Street_--_2024_--_3544.jpg/330px-Cape_Town_%28ZA%29%2C_Wale_Street_--_2024_--_3544.jpg',

extracted_from_files

URL
detected URL: https://upload.wikimedia.org/wikipedia/commons/thumb/b/b2/Cape_Town_%28ZA%29%2C_Wale_Street_--_2024_--_3544.jpg/1920px-Cape_Town_%28ZA%29%2C_Wale_Street_--_2024_--_3544.jpg',

XIOC detected URL: https://upload.wikimedia.org/wikipedia/commons/thumb/b/b2/Cape_Town_%28ZA%29%2C_Wale_Street_--_2024_--_3544.jpg/1920px-Cape_Town_%28ZA%29%2C_Wale_Street_--_2024_--_3544.jpg',

extracted_from_files

Domain
detected Domain: a.yt

XIOC detected Domain: a.yt

extracted_from_files

Domain
detected Domain: l-i.yt

XIOC detected Domain: l-i.yt

extracted_from_files

Domain
detected Domain: p.yt

XIOC detected Domain: p.yt

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

URL
detected URL: http://addons.mozilla.org/ca/crl.pem0N

XIOC detected URL: http://addons.mozilla.org/ca/crl.pem0N

extracted_from_files

URL
detected URL: http://www.gnu.org/licenses/

XIOC detected URL: http://www.gnu.org/licenses/

extracted_from_files

Domain
detected Domain: c.site

XIOC detected Domain: c.site

extracted_from_files

Domain
detected Domain: p.site

XIOC detected Domain: p.site

extracted_from_files

Domain
detected Domain: r.site

XIOC detected Domain: r.site

extracted_from_files

Domain
detected Domain: i.site

XIOC detected Domain: i.site

extracted_from_files

Domain
detected Domain: o.site

XIOC detected Domain: o.site

extracted_from_files

Domain
detected Domain: q.site

XIOC detected Domain: q.site

extracted_from_files

URL
detected Domain: defaulturl.search

XIOC detected Domain: defaulturl.search

extracted_from_files

Domain
detected Domain: d.va

XIOC detected Domain: d.va

extracted_from_files

Domain
detected Domain: this.edge.va

XIOC detected Domain: this.edge.va

extracted_from_files

Domain
detected Domain: b.va

XIOC detected Domain: b.va

extracted_from_files

Domain
detected Domain: b.site

XIOC detected Domain: b.site

extracted_from_files

Domain
detected Domain: e.site

XIOC detected Domain: e.site

extracted_from_files

Domain
detected Domain: n.site

XIOC detected Domain: n.site

extracted_from_files

Domain
detected Domain: m.site

XIOC detected Domain: m.site

extracted_from_files

Domain
detected Domain: thread.name

XIOC detected Domain: thread.name

extracted_from_files

Domain
detected Domain: msg.data

XIOC detected Domain: msg.data

extracted_from_files

Domain
detected Domain: msg.id

XIOC detected Domain: msg.id

extracted_from_files

Domain
detected Domain: license.md

XIOC detected Domain: license.md

extracted_from_files

Domain
detected Domain: this.site

XIOC detected Domain: this.site

extracted_from_files

Domain
detected Domain: c.va

XIOC detected Domain: c.va

extracted_from_files

Domain
detected Domain: this.va

XIOC detected Domain: this.va

extracted_from_files

Domain
detected Domain: this.jobs

XIOC detected Domain: this.jobs

extracted_from_files

Domain
detected Domain: job.data

XIOC detected Domain: job.data

extracted_from_files

Domain
detected Domain: ev.data

XIOC detected Domain: ev.data

extracted_from_files

Domain
detected Domain: console.info

XIOC detected Domain: console.info

extracted_from_files

Domain
detected Domain: job.id

XIOC detected Domain: job.id

extracted_from_files

Domain
detected Domain: a.name

XIOC detected Domain: a.name

extracted_from_files

Domain
detected Domain: b.name

XIOC detected Domain: b.name

extracted_from_files

Domain
detected Domain: this.drawingstack.map

XIOC detected Domain: this.drawingstack.map

extracted_from_files

Domain
detected Domain: developer.mozilla.org

XIOC detected Domain: developer.mozilla.org

extracted_from_files

Domain
detected Domain: browser.storage

XIOC detected Domain: browser.storage

extracted_from_files

Domain
detected Domain: object.prototype.tostring.call

XIOC detected Domain: object.prototype.tostring.call

extracted_from_files

Domain
detected Domain: object.prototype.hasownproperty.call

XIOC detected Domain: object.prototype.hasownproperty.call

extracted_from_files

Domain
detected Domain: lz4.data

XIOC detected Domain: lz4.data

extracted_from_files

Domain
detected Domain: this.name

XIOC detected Domain: this.name

extracted_from_files

Domain
detected Domain: target.id

XIOC detected Domain: target.id

extracted_from_files

Domain
detected Domain: sidebox.tl

XIOC detected Domain: sidebox.tl

extracted_from_files

Domain
detected Domain: sidebox.br

XIOC detected Domain: sidebox.br

extracted_from_files

Domain
detected Domain: partbox.tl

XIOC detected Domain: partbox.tl

extracted_from_files

Domain
detected Domain: bedbox.tl

XIOC detected Domain: bedbox.tl

extracted_from_files

Domain
detected Domain: partbox.br

XIOC detected Domain: partbox.br

extracted_from_files

Domain
detected Domain: bedbox.br

XIOC detected Domain: bedbox.br

extracted_from_files

URL
detected URL: https://github.com/gorhill/Javascript-Voronoi/LICENSE.md

XIOC detected URL: https://github.com/gorhill/Javascript-Voronoi/LICENSE.md

extracted_from_files

Hash
detected MD5 Hash: 2F6C4E33384C49709AE6DD3AB0AF7EB8

XIOC detected MD5 Hash: 2F6C4E33384C49709AE6DD3AB0AF7EB8

extracted_from_files

Domain
detected Domain: options.id

XIOC detected Domain: options.id

extracted_from_files

Domain
detected Domain: shadowedbbox.br

XIOC detected Domain: shadowedbbox.br

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

URL
detected URL: https://freesound.org/people/J.Zazvurek/

XIOC detected URL: https://freesound.org/people/J.Zazvurek/

extracted_from_files

Domain
detected Domain: part.id

XIOC detected Domain: part.id

extracted_from_files

Domain
detected Domain: ctx.save

XIOC detected Domain: ctx.save

extracted_from_files

Domain
detected Domain: this.sides.map

XIOC detected Domain: this.sides.map

extracted_from_files

Domain
detected Domain: data.sides.map

XIOC detected Domain: data.sides.map

extracted_from_files

Domain
detected Domain: a.sides.map

XIOC detected Domain: a.sides.map

extracted_from_files

Domain
detected Domain: a.map

XIOC detected Domain: a.map

extracted_from_files

Domain
detected Domain: other.id

XIOC detected Domain: other.id

extracted_from_files

Domain
detected Domain: thisside.id

XIOC detected Domain: thisside.id

extracted_from_files

Domain
detected Domain: data.br

XIOC detected Domain: data.br

extracted_from_files

Domain
detected Domain: this.id

XIOC detected Domain: this.id

extracted_from_files

Domain
detected Domain: a.id

XIOC detected Domain: a.id

extracted_from_files

Domain
detected Domain: this.bbox.tl

XIOC detected Domain: this.bbox.tl

extracted_from_files

Domain
detected Domain: this.bbox.br

XIOC detected Domain: this.bbox.br

extracted_from_files

Domain
detected Domain: side.id

XIOC detected Domain: side.id

extracted_from_files

Domain
detected Domain: data.id

XIOC detected Domain: data.id

extracted_from_files

Domain
detected Domain: a.tl

XIOC detected Domain: a.tl

extracted_from_files

Domain
detected Domain: a.br

XIOC detected Domain: a.br

extracted_from_files

Domain
detected Domain: bb.br

XIOC detected Domain: bb.br

extracted_from_files

Domain
detected Domain: bb.tl

XIOC detected Domain: bb.tl

extracted_from_files

Domain
detected Domain: other.tl

XIOC detected Domain: other.tl

extracted_from_files

Domain
detected Domain: other.br

XIOC detected Domain: other.br

extracted_from_files

Domain
detected Domain: data.tl

XIOC detected Domain: data.tl

extracted_from_files

Domain
detected Domain: freesound.org

XIOC detected Domain: freesound.org

extracted_from_files

Domain
detected Domain: paulbourke.net

XIOC detected Domain: paulbourke.net

extracted_from_files

Domain
detected Domain: alienryderflex.com

XIOC detected Domain: alienryderflex.com

extracted_from_files

Domain
detected Domain: bbox.tl

XIOC detected Domain: bbox.tl

extracted_from_files

Domain
detected Domain: bbox.br

XIOC detected Domain: bbox.br

extracted_from_files

Domain
detected Domain: this.tl

XIOC detected Domain: this.tl

extracted_from_files

Domain
detected Domain: this.br

XIOC detected Domain: this.br

extracted_from_files

Domain
detected Domain: adomas.org

XIOC detected Domain: adomas.org

extracted_from_files

Domain
detected Domain: elem.id

XIOC detected Domain: elem.id

extracted_from_files

Domain
detected Domain: playtick.tick.play

XIOC detected Domain: playtick.tick.play

extracted_from_files

Domain
detected Domain: claps.play

XIOC detected Domain: claps.play

extracted_from_files

Domain
detected Domain: ev.target

XIOC detected Domain: ev.target

extracted_from_files

Domain
detected Domain: rect.top

XIOC detected Domain: rect.top

extracted_from_files

Domain
detected Domain: www.wikidata.org

XIOC detected Domain: www.wikidata.org

extracted_from_files

Domain
detected Domain: a.mw

XIOC detected Domain: a.mw

extracted_from_files

Domain
detected Domain: img.mw

XIOC detected Domain: img.mw

extracted_from_files

Domain
detected Domain: www.mediawiki.org

XIOC detected Domain: www.mediawiki.org

extracted_from_files

Domain
detected Domain: validwidths.at

XIOC detected Domain: validwidths.at

extracted_from_files

Domain
detected Domain: region.bbox.tl

XIOC detected Domain: region.bbox.tl

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: upload.wikimedia.org

XIOC detected Domain: upload.wikimedia.org

extracted_from_files

Domain
detected Domain: ޓ.ws

XIOC detected Domain: ޓ.ws

extracted_from_files

Domain
detected Domain: www.gnu.org

XIOC detected Domain: www.gnu.org

extracted_from_files

Domain
detected Domain: github.com

XIOC detected Domain: github.com

extracted_from_files

Domain
detected Domain: self.chrome

XIOC detected Domain: self.chrome

extracted_from_files

Domain
detected Domain: www.publicdomainpictures.net

XIOC detected Domain: www.publicdomainpictures.net

extracted_from_files

Domain
detected Domain: array.map

XIOC detected Domain: array.map

extracted_from_files

Domain
detected Domain: commons.wikimedia.org

XIOC detected Domain: commons.wikimedia.org

extracted_from_files

Domain
detected Domain: addons.mozilla.org

XIOC detected Domain: addons.mozilla.org

extracted_from_files

Domain
detected Domain: content-signature.mozilla.org

XIOC detected Domain: content-signature.mozilla.org

extracted_from_files

Domain
detected Domain: raymondhill.net

XIOC detected Domain: raymondhill.net

extracted_from_files

Domain
detected Domain: t61891be5a24f3c00743bf13c6b2338d5.1c3a6b440a60853b645fce7b604912e9.addons.mozilla.org

XIOC detected Domain: t61891be5a24f3c00743bf13c6b2338d5.1c3a6b440a60853b645fce7b604912e9.addons.mozilla.org

extracted_from_files

Domain
detected Domain: publicdomainpictures.net

XIOC detected Domain: publicdomainpictures.net

extracted_from_files

Domain
detected Domain: js.fi

XIOC detected Domain: js.fi

extracted_from_files

Domain
detected Domain: bw.mw

XIOC detected Domain: bw.mw

extracted_from_files

Domain
detected Domain: 9s.mp

XIOC detected Domain: 9s.mp

extracted_from_files

Domain
detected Domain: 8sec.mp

XIOC detected Domain: 8sec.mp

extracted_from_files

Domain
detected Domain: 5sec.mp

XIOC detected Domain: 5sec.mp

extracted_from_files

Domain
detected Domain: 02.mp

XIOC detected Domain: 02.mp

extracted_from_files

Domain
detected Domain: 01.mp

XIOC detected Domain: 01.mp

extracted_from_files

Domain
detected Domain: signingca1.addons.mozilla.org

XIOC detected Domain: signingca1.addons.mozilla.org

extracted_from_files

Domain
detected Domain: mozilla.com

XIOC detected Domain: mozilla.com

extracted_from_files

IP
detected IP: 3::f

XIOC detected IP: 3::f

extracted_from_files

IP
detected IP: ::0

XIOC detected IP: ::0

extracted_from_files

IP
detected IP: 8::

XIOC detected IP: 8::

extracted_from_files

IP
detected IP: ::b

XIOC detected IP: ::b

extracted_from_files

IP
detected IP: 1::

XIOC detected IP: 1::

extracted_from_files

IP
detected IP: 0::

XIOC detected IP: 0::

extracted_from_files

IP
detected IP: ::af

XIOC detected IP: ::af

extracted_from_files

URL
detected URL: https://github.com/gorhill/Javascript-Voronoi

XIOC detected URL: https://github.com/gorhill/Javascript-Voronoi

extracted_from_files

URL
detected URL: https://github.com/gorhill/lz4-wasm/blob/8995cdef7b/dist/lz4-block-codec-js.js

XIOC detected URL: https://github.com/gorhill/lz4-wasm/blob/8995cdef7b/dist/lz4-block-codec-js.js

extracted_from_files

URL
detected URL: https://developer.mozilla.org/en-US/docs/Web/API/Web_Workers_API/Structured_clone_algorithm#supported_types

XIOC detected URL: https://developer.mozilla.org/en-US/docs/Web/API/Web_Workers_API/Structured_clone_algorithm#supported_types

extracted_from_files

URL
detected URL: https://github.com/gorhill/uBlock

XIOC detected URL: https://github.com/gorhill/uBlock

extracted_from_files

URL
detected URL: https://*.publicdomainpictures.net/*

XIOC detected URL: https://*.publicdomainpictures.net/*

extracted_from_files

URL
detected URL: https://commons.wikimedia.org/*

XIOC detected URL: https://commons.wikimedia.org/*

extracted_from_files

Hash
detected MD5 Hash: 1c3a6b440a60853b645fce7b604912e9

XIOC detected MD5 Hash: 1c3a6b440a60853b645fce7b604912e9

extracted_from_files

Domain
detected Domain: piece.id

XIOC detected Domain: piece.id

extracted_from_files

Domain
detected Domain: l.va

XIOC detected Domain: l.va

extracted_from_files

Security Analysis Summary

Security Analysis Overview

JSaw Puzzle is a Firefox Add-ons extension published by Raymond Hill. Version 1.11 has been analyzed by the Risky Plugins security platform, receiving a risk score of 56.33/100 (MEDIUM risk) based on 206 security findings.

Risk Assessment

This extension presents moderate security risk. Several findings were detected that may warrant attention. Users should carefully review the permissions and findings before installation.

Findings Breakdown

  • High: 38 finding(s)
  • Medium: 168 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

JSaw Puzzle is published by Raymond Hill on the Firefox Add-ons marketplace. The extension has approximately 61 users.

Recommendation

Exercise caution with this extension. Review the detailed findings and ensure the requested permissions align with the extension's stated functionality before installation.

Frequently Asked Questions