Is "Fusion Tables" on Firefox Add-ons Safe to Install?
Easy to Search and Find Tables of the Oracle Fusion Suite
Risk Assessment
Pending0 security findings detected across all analyzers
Firefox extension requesting 7 permissions
No Threats Detected
This extension passed all security checks
About This Extension
No Findings
All security checks passed
AI Security Report
AI Security Analysis: Fusion Tables
Analysis generated: 2025-12-11T18:04:46+13:00
Model: gemini-3-pro-preview
Quick Facts
| Property | Value |
|---|---|
| UUID | 082a1664-366f-575c-9596-dd8cce4e8721 |
| Type | firefox |
| Version | |
| Users | 40 |
| Risk Score | 100.0/100 (CRITICAL) |
| Malware Detected | ⚠️ Yes |
| Secrets Exposed | ✅ No |
| Critical Vulns | ✅ No |
AI Analysis
Based on the provided security scan data, here is the analysis for the "Fusion Tables" Firefox extension.
Executive Summary
The "Fusion Tables" extension represents a CRITICAL security risk and should be blocked or removed immediately. The analysis detected multiple high-severity indicators consistent with malicious software, including attempts to establish persistence, modify the system registry, and execute system-level commands. With a risk score of 100/100, an unverified developer, and a negligible user base, this extension exhibits the characteristics of a "Trojan" malware dropper or a highly invasive surveillance tool disguised as a utility for Oracle Fusion applications.
Threat Assessment
The security posture of this extension is extremely poor. The findings indicate a high probability that the extension attempts to break out of the standard browser sandbox to infect the underlying operating system.
Specific Threats:
- Sandbox Escape & System Compromise: The presence of
postinstall_registry_modificationandpostinstall_system_commandsignatures suggests the extension includes scripts intended to run outside the browser. Standard extensions should not touch the Windows Registry or execute shell commands. - Persistence & Stealth: The
postinstall_persistence_mechanismandpostinstall_obfuscationfindings indicate the code attempts to hide itself and ensure it restarts automatically if the browser or computer is rebooted. - Dropper Behavior: The
postinstall_file_downloadsignature suggests the extension may act as a gateway to download additional malicious payloads from the internet after installation. - Massive IOC Volume: The extension contains over 19,000 references to Oracle Cloud documentation URLs. While these URLs are legitimate Oracle domains, their sheer volume suggests the extension is either:
- A bloated, poorly coded documentation scraper.
- Using these strings as "padding" to bypass antivirus scanners (a technique where malicious code is hidden inside a massive amount of legitimate text).
Risk Justification
The 100/100 Risk Score is fully justified and accurate based on the following factors:
- Malware Signatures (Critical): The combination of Registry Modification, System Command Execution, and Persistence mechanisms is the "unholy trinity" of malware behavior. Legitimate browser extensions rarely, if ever, require these permissions combined.
- Unverified Identity: The developer "Radu" is unverified, and the user count (40) is dangerously low, providing no "safety in numbers" or community vetting.
- Obfuscation: The use of code obfuscation prevents easy analysis of the source code, a tactic almost exclusively used by malicious actors or commercial software protecting IP (unlikely for a simple free extension).
Key Findings
- System Manipulation Attempts (High Severity): YARA rules triggered for
postinstall_registry_modificationandpostinstall_system_command. This indicates the extension carries a payload designed to alter the host operating system, not just the browser. - Persistence Mechanisms (High Severity): The
postinstall_persistence_mechanismfinding suggests the extension installs components designed to survive restarts, a hallmark of spyware and botnets. - Code Obfuscation (High Severity): The code is intentionally obscured (
postinstall_obfuscation), making it difficult to verify what the code actually does. - Anomalous URL Count (Medium Severity): The extension contains 19,569 hardcoded URLs pointing to Oracle documentation. This is highly abnormal for a standard extension and suggests data scraping or antivirus evasion techniques.
- Insecure Storage (High Severity):
LocalStorageShouldNotBeUsedindicates sensitive data may be stored in plain text within the browser, accessible to other scripts.
Recommendations
- Immediate Removal: Uninstall this extension from all browsers immediately.
- Blocklist: Add the Extension UUID (
082a1664-366f-575c-9596-dd8cce4e8721) to the organization's browser policy blocklist to prevent re-installation. - Endpoint Scan: Because the findings indicate potential system-level compromise (registry/file manipulation), run a full antivirus/EDR scan on any machine where this extension was installed.
- Credential Rotation: As a precaution, rotate passwords for any Oracle Cloud or Fusion services accessed while this extension was active, as well as any credentials saved in the browser.
- Network Blocking: Monitor for and block traffic to unknown IPs, as the
postinstall_network_communicationrule suggests the extension phones home.
Mitigation Strategies
There are no safe mitigation strategies for this extension.
Due to the presence of obfuscated code and indicators of system-level compromise (Registry/Command execution), it is impossible to isolate the risk while keeping the extension active. The functionality provided (likely related to Oracle Fusion Tables) should be sought through official Oracle tools or verified third-party vendors.
Confidence Assessment
Confidence Level: 80%
While the YARA signatures are strong indicators of malware, there is a slight possibility (20%) that this is a poorly architected "Native Messaging" host application. Some legitimate enterprise extensions use native installers to communicate with desktop applications, which triggers registry and file manipulation warnings. However, given the unverified developer ("Radu") and the lack of documentation explaining this behavior, it must be treated as malicious until proven otherwise. The massive number of Oracle URLs leans towards this being a clumsy tool, but the security risks of the installation scripts are too high to ignore.
Disclaimer
This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace