Is "Extension" on Firefox Add-ons Safe to Install?

Pablo Androetto · firefox · v1.3.14

Risk Assessment

Analyzed
100
out of 100
CRITICAL

246 security findings detected across all analyzers

Firefox extension requesting 3 permissions

Severity Breakdown

0
Critical
73
High
173
Medium
0
Low
0
Info

Finding Categories

73
Malware Signatures
171
IoC Indicators

YARA Rules Matched

11 rules(73 hits)
postinstall file manipulation NoUseWeakRandom postinstall system command postinstall network communication postinstall file download postinstall persistence mechanism SQLInjection postinstall obfuscation LocalStorageShouldNotBeUsed postinstall crypto operations postinstall registry modification

Requested Permissions

3 permissions
activeTab
Medium
scripting
Low
https://nivel20.com/*
Low

Detailed Findings

73 total

YARA Rule Matches

11 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
30
IP Addresses
10
Domains
132
Strings
171

All Indicators · 171

Domain
detected Domain: data.data

XIOC detected Domain: data.data

extracted_from_files

Domain
detected Domain: blendinput.off

XIOC detected Domain: blendinput.off

extracted_from_files

URL
detected URL: https://fonts.googleapis.com/css2?family=Montserrat:ital,wght@0,100..900;1,100..900&display=swap

XIOC detected URL: https://fonts.googleapis.com/css2?family=Montserrat:ital,wght@0,100..900;1,100..900&display=swap

extracted_from_files

URL
detected URL: https://ko-fi.com/androettop

XIOC detected URL: https://ko-fi.com/androettop

extracted_from_files

URL
detected URL: https://cdn.jsdelivr.net/npm/[email protected]/css/font-awesome.min.css');

XIOC detected URL: https://cdn.jsdelivr.net/npm/[email protected]/css/font-awesome.min.css');

extracted_from_files

URL
detected URL: https://github.com/androettop/nivel21

XIOC detected URL: https://github.com/androettop/nivel21

extracted_from_files

URL
detected URL: https://em-content.zobj.net/source/animated-noto-color-emoji/427/exclamation-mark_2757.gif

XIOC detected URL: https://em-content.zobj.net/source/animated-noto-color-emoji/427/exclamation-mark_2757.gif

extracted_from_files

URL
detected URL: https://em-content.zobj.net/source/animated-noto-color-emoji/427/cross-mark_274c.gif

XIOC detected URL: https://em-content.zobj.net/source/animated-noto-color-emoji/427/cross-mark_274c.gif

extracted_from_files

URL
detected URL: https://blueoakcouncil.org/license/1.0.0),

XIOC detected URL: https://blueoakcouncil.org/license/1.0.0),

extracted_from_files

URL
detected URL: https://www.apache.org/licenses/LICENSE-2.0.html),

XIOC detected URL: https://www.apache.org/licenses/LICENSE-2.0.html),

extracted_from_files

URL
detected URL: https://spdx.org/licenses/MIT.html),

XIOC detected URL: https://spdx.org/licenses/MIT.html),

extracted_from_files

URL
detected URL: https://spdx.org/licenses/BSD-2-Clause.html)

XIOC detected URL: https://spdx.org/licenses/BSD-2-Clause.html)

extracted_from_files

URL
detected URL: http://addons.mozilla.org/ca/crl.pem0N

XIOC detected URL: http://addons.mozilla.org/ca/crl.pem0N

extracted_from_files

URL
detected URL: https://nivel20.com/*

XIOC detected URL: https://nivel20.com/*

extracted_from_files

URL
detected URL: https://fonts.googleapis.com

XIOC detected URL: https://fonts.googleapis.com

extracted_from_files

Domain
detected Domain: importnode.call

XIOC detected Domain: importnode.call

extracted_from_files

Domain
detected Domain: body.ownerdocument.doctype.name

XIOC detected Domain: body.ownerdocument.doctype.name

extracted_from_files

Domain
detected Domain: n21-settings-tab.is

XIOC detected Domain: n21-settings-tab.is

extracted_from_files

Domain
detected Domain: n21-settings-category.is

XIOC detected Domain: n21-settings-category.is

extracted_from_files

Domain
detected Domain: n21-setting-item.is

XIOC detected Domain: n21-setting-item.is

extracted_from_files

Other
detected Email: kt}^?@l�d3y�d2ڳ.cf

XIOC detected Email: kt}^?@l�d3y�d2ڳ.cf

extracted_from_files

Domain
detected Domain: cfg.in

XIOC detected Domain: cfg.in

extracted_from_files

Domain
detected Domain: expressions.is

XIOC detected Domain: expressions.is

extracted_from_files

Domain
detected Domain: getelementsbytagname.call

XIOC detected Domain: getelementsbytagname.call

extracted_from_files

Domain
detected Domain: createnodeiterator.call

XIOC detected Domain: createnodeiterator.call

extracted_from_files

Domain
detected Domain: nodefilter.show

XIOC detected Domain: nodefilter.show

extracted_from_files

Domain
detected Domain: hook.call

XIOC detected Domain: hook.call

extracted_from_files

Domain
detected Domain: createdocumentfragment.call

XIOC detected Domain: createdocumentfragment.call

extracted_from_files

Domain
detected Domain: oe.call

XIOC detected Domain: oe.call

extracted_from_files

Domain
detected Domain: ie.call

XIOC detected Domain: ie.call

extracted_from_files

Domain
detected Domain: n.ownerdocument.doctype.name

XIOC detected Domain: n.ownerdocument.doctype.name

extracted_from_files

Domain
detected Domain: w3c.github.io

XIOC detected Domain: w3c.github.io

extracted_from_files

Domain
detected Domain: html.spec.whatwg.org

XIOC detected Domain: html.spec.whatwg.org

extracted_from_files

Domain
detected Domain: bugs.chromium.org

XIOC detected Domain: bugs.chromium.org

extracted_from_files

Domain
detected Domain: cfg.safe

XIOC detected Domain: cfg.safe

extracted_from_files

Domain
detected Domain: www.w3.org

XIOC detected Domain: www.w3.org

extracted_from_files

Domain
detected Domain: e.safe

XIOC detected Domain: e.safe

extracted_from_files

Domain
detected Domain: e.in

XIOC detected Domain: e.in

extracted_from_files

Domain
detected Domain: re.call

XIOC detected Domain: re.call

extracted_from_files

Domain
detected Domain: ne.call

XIOC detected Domain: ne.call

extracted_from_files

Domain
detected Domain: f.show

XIOC detected Domain: f.show

extracted_from_files

Domain
detected Domain: e.call

XIOC detected Domain: e.call

extracted_from_files

Domain
detected Domain: button.off

XIOC detected Domain: button.off

extracted_from_files

Domain
detected Domain: ʑo.us

XIOC detected Domain: ʑo.us

extracted_from_files

Domain
detected Domain: targetbutton.click

XIOC detected Domain: targetbutton.click

extracted_from_files

Domain
detected Domain: layers.map

XIOC detected Domain: layers.map

extracted_from_files

Domain
detected Domain: layer.name

XIOC detected Domain: layer.name

extracted_from_files

Domain
detected Domain: e.target

XIOC detected Domain: e.target

extracted_from_files

Domain
detected Domain: metadata.name

XIOC detected Domain: metadata.name

extracted_from_files

Domain
detected Domain: presets.map

XIOC detected Domain: presets.map

extracted_from_files

Domain
detected Domain: preset.id

XIOC detected Domain: preset.id

extracted_from_files

Domain
detected Domain: arg1.name

XIOC detected Domain: arg1.name

extracted_from_files

Domain
detected Domain: tabs.off

XIOC detected Domain: tabs.off

extracted_from_files

Domain
detected Domain: tab.data

XIOC detected Domain: tab.data

extracted_from_files

Domain
detected Domain: input.data

XIOC detected Domain: input.data

extracted_from_files

Domain
detected Domain: button.data

XIOC detected Domain: button.data

extracted_from_files

Domain
detected Domain: item.id

XIOC detected Domain: item.id

extracted_from_files

Domain
detected Domain: parentitem.id

XIOC detected Domain: parentitem.id

extracted_from_files

Domain
detected Domain: actionbar.data

XIOC detected Domain: actionbar.data

extracted_from_files

Domain
detected Domain: chat.link

XIOC detected Domain: chat.link

extracted_from_files

Domain
detected Domain: activeping.marker.style.top

XIOC detected Domain: activeping.marker.style.top

extracted_from_files

Domain
detected Domain: marker.style.top

XIOC detected Domain: marker.style.top

extracted_from_files

Domain
detected Domain: p.id

XIOC detected Domain: p.id

extracted_from_files

Domain
detected Domain: previewtoggle.off

XIOC detected Domain: previewtoggle.off

extracted_from_files

Domain
detected Domain: clearbutton.off

XIOC detected Domain: clearbutton.off

extracted_from_files

Domain
detected Domain: applybutton.off

XIOC detected Domain: applybutton.off

extracted_from_files

Domain
detected Domain: textarea.select

XIOC detected Domain: textarea.select

extracted_from_files

Domain
detected Domain: item.name

XIOC detected Domain: item.name

extracted_from_files

Domain
detected Domain: el.name

XIOC detected Domain: el.name

extracted_from_files

Domain
detected Domain: reusable.id

XIOC detected Domain: reusable.id

extracted_from_files

Domain
detected Domain: category.name

XIOC detected Domain: category.name

extracted_from_files

Domain
detected Domain: setting.name

XIOC detected Domain: setting.name

extracted_from_files

Domain
detected Domain: em-content.zobj.net

XIOC detected Domain: em-content.zobj.net

extracted_from_files

Domain
detected Domain: overlay.id

XIOC detected Domain: overlay.id

extracted_from_files

Domain
detected Domain: input.off

XIOC detected Domain: input.off

extracted_from_files

URL
detected URL: http://w3c.github.io/webcomponents/spec/custom/#creating-and-passing-registries)

XIOC detected URL: http://w3c.github.io/webcomponents/spec/custom/#creating-and-passing-registries)

extracted_from_files

URL
detected URL: http://www.w3.org/1999/xhtml

XIOC detected URL: http://www.w3.org/1999/xhtml

extracted_from_files

URL
detected URL: http://www.w3.org/TR/xml/#d0e804)

XIOC detected URL: http://www.w3.org/TR/xml/#d0e804)

extracted_from_files

Domain
detected Domain: options.id

XIOC detected Domain: options.id

extracted_from_files

Domain
detected Domain: native.room

XIOC detected Domain: native.room

extracted_from_files

Domain
detected Domain: originalsend.call

XIOC detected Domain: originalsend.call

extracted_from_files

Domain
detected Domain: native.off

XIOC detected Domain: native.off

extracted_from_files

Domain
detected Domain: registration.id

XIOC detected Domain: registration.id

extracted_from_files

Domain
detected Domain: token-drag-measurement.show

XIOC detected Domain: token-drag-measurement.show

extracted_from_files

Domain
detected Domain: window.app

XIOC detected Domain: window.app

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

URL
detected URL: https://fonts.gstatic.com

XIOC detected URL: https://fonts.gstatic.com

extracted_from_files

Domain
detected Domain: h.name

XIOC detected Domain: h.name

extracted_from_files

Domain
detected Domain: modifier.name

XIOC detected Domain: modifier.name

extracted_from_files

Domain
detected Domain: m.name

XIOC detected Domain: m.name

extracted_from_files

Domain
detected Domain: modifiers.map

XIOC detected Domain: modifiers.map

extracted_from_files

Domain
detected Domain: menu.is

XIOC detected Domain: menu.is

extracted_from_files

Domain
detected Domain: event.target

XIOC detected Domain: event.target

extracted_from_files

Domain
detected Domain: rect.top

XIOC detected Domain: rect.top

extracted_from_files

Domain
detected Domain: suboption.id

XIOC detected Domain: suboption.id

extracted_from_files

Domain
detected Domain: argtokens.map

XIOC detected Domain: argtokens.map

extracted_from_files

Domain
detected Domain: parsed.name

XIOC detected Domain: parsed.name

extracted_from_files

Domain
detected Domain: feature.name

XIOC detected Domain: feature.name

extracted_from_files

Domain
detected Domain: e.name

XIOC detected Domain: e.name

extracted_from_files

Domain
detected Domain: window.camera

XIOC detected Domain: window.camera

extracted_from_files

Domain
detected Domain: option.id

XIOC detected Domain: option.id

extracted_from_files

Domain
detected Domain: option.submenu.map

XIOC detected Domain: option.submenu.map

extracted_from_files

Domain
detected Domain: sub.id

XIOC detected Domain: sub.id

extracted_from_files

Domain
detected Domain: normalized.id

XIOC detected Domain: normalized.id

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: fonts.gstatic.com

XIOC detected Domain: fonts.gstatic.com

extracted_from_files

Domain
detected Domain: cdn.jsdelivr.net

XIOC detected Domain: cdn.jsdelivr.net

extracted_from_files

Domain
detected Domain: interceptor.name

XIOC detected Domain: interceptor.name

extracted_from_files

Domain
detected Domain: i.name

XIOC detected Domain: i.name

extracted_from_files

Domain
detected Domain: function.prototype.call

XIOC detected Domain: function.prototype.call

extracted_from_files

Domain
detected Domain: system.app

XIOC detected Domain: system.app

extracted_from_files

Domain
detected Domain: xr.app

XIOC detected Domain: xr.app

extracted_from_files

Domain
detected Domain: w.ki

XIOC detected Domain: w.ki

extracted_from_files

Domain
detected Domain: i.zw

XIOC detected Domain: i.zw

extracted_from_files

Domain
detected Domain: t.tw

XIOC detected Domain: t.tw

extracted_from_files

Domain
detected Domain: l.gu

XIOC detected Domain: l.gu

extracted_from_files

Domain
detected Domain: cy.ch

XIOC detected Domain: cy.ch

extracted_from_files

Domain
detected Domain: fonts.googleapis.com

XIOC detected Domain: fonts.googleapis.com

extracted_from_files

Domain
detected Domain: ko-fi.com

XIOC detected Domain: ko-fi.com

extracted_from_files

Domain
detected Domain: ᄙ.fm

XIOC detected Domain: ᄙ.fm

extracted_from_files

Domain
detected Domain: ud.dz

XIOC detected Domain: ud.dz

extracted_from_files

Domain
detected Domain: l�d3y�d2ڳ.cf

XIOC detected Domain: l�d3y�d2ڳ.cf

extracted_from_files

Domain
detected Domain: d2ڳ.cf

XIOC detected Domain: d2ڳ.cf

extracted_from_files

Domain
detected Domain: s.re

XIOC detected Domain: s.re

extracted_from_files

Domain
detected Domain: l.mq

XIOC detected Domain: l.mq

extracted_from_files

Domain
detected Domain: b.vu

XIOC detected Domain: b.vu

extracted_from_files

Domain
detected Domain: ւwh.ao

XIOC detected Domain: ւwh.ao

extracted_from_files

Domain
detected Domain: h.as

XIOC detected Domain: h.as

extracted_from_files

Domain
detected Domain: a.ad

XIOC detected Domain: a.ad

extracted_from_files

Domain
detected Domain: handler.name

XIOC detected Domain: handler.name

extracted_from_files

Domain
detected Domain: z.re

XIOC detected Domain: z.re

extracted_from_files

Domain
detected Domain: w.cu

XIOC detected Domain: w.cu

extracted_from_files

Domain
detected Domain: qihcj.tm

XIOC detected Domain: qihcj.tm

extracted_from_files

Domain
detected Domain: content-signature.mozilla.org

XIOC detected Domain: content-signature.mozilla.org

extracted_from_files

Domain
detected Domain: t653f7a36400ad748cfd203db6fc52ed9.d9b143b9b8e468cbe4d719b7e641f655.addons.mozilla.org

XIOC detected Domain: t653f7a36400ad748cfd203db6fc52ed9.d9b143b9b8e468cbe4d719b7e641f655.addons.mozilla.org

extracted_from_files

Domain
detected Domain: nivel20.com

XIOC detected Domain: nivel20.com

extracted_from_files

Domain
detected Domain: r.cl

XIOC detected Domain: r.cl

extracted_from_files

Domain
detected Domain: b.ls

XIOC detected Domain: b.ls

extracted_from_files

Domain
detected Domain: l.pr

XIOC detected Domain: l.pr

extracted_from_files

Domain
detected Domain: zn.gr

XIOC detected Domain: zn.gr

extracted_from_files

Domain
detected Domain: blueoakcouncil.org

XIOC detected Domain: blueoakcouncil.org

extracted_from_files

Domain
detected Domain: www.apache.org

XIOC detected Domain: www.apache.org

extracted_from_files

Domain
detected Domain: spdx.org

XIOC detected Domain: spdx.org

extracted_from_files

Domain
detected Domain: purify.min.js.map

XIOC detected Domain: purify.min.js.map

extracted_from_files

Domain
detected Domain: signingca1.addons.mozilla.org

XIOC detected Domain: signingca1.addons.mozilla.org

extracted_from_files

Domain
detected Domain: mozilla.com

XIOC detected Domain: mozilla.com

extracted_from_files

Domain
detected Domain: addons.mozilla.org

XIOC detected Domain: addons.mozilla.org

extracted_from_files

IP
detected IP: 0::

XIOC detected IP: 0::

extracted_from_files

IP
detected IP: 109::6

XIOC detected IP: 109::6

extracted_from_files

IP
detected IP: e::bef

XIOC detected IP: e::bef

extracted_from_files

IP
detected IP: 4.2.10.2

XIOC detected IP: 4.2.10.2

extracted_from_files

IP
detected IP: ::af

XIOC detected IP: ::af

extracted_from_files

IP
detected IP: ::bef

XIOC detected IP: ::bef

extracted_from_files

Domain
detected Domain: github.com

XIOC detected Domain: github.com

extracted_from_files

URL
detected URL: http://www.w3.org/1998/Math/MathML

XIOC detected URL: http://www.w3.org/1998/Math/MathML

extracted_from_files

URL
detected URL: https://em-content.zobj.net/source/animated-noto-color-emoji/427/fire_1f525.gif

XIOC detected URL: https://em-content.zobj.net/source/animated-noto-color-emoji/427/fire_1f525.gif

extracted_from_files

URL
detected URL: https://em-content.zobj.net/source/animated-noto-color-emoji/427/question-mark_2753.gif

XIOC detected URL: https://em-content.zobj.net/source/animated-noto-color-emoji/427/question-mark_2753.gif

extracted_from_files

URL
detected URL: https://em-content.zobj.net/source/animated-noto-color-emoji/427/skull_1f480.gif

XIOC detected URL: https://em-content.zobj.net/source/animated-noto-color-emoji/427/skull_1f480.gif

extracted_from_files

URL
detected URL: https://em-content.zobj.net/source/animated-noto-color-emoji/427/warning_26a0-fe0f.gif

XIOC detected URL: https://em-content.zobj.net/source/animated-noto-color-emoji/427/warning_26a0-fe0f.gif

extracted_from_files

URL
detected URL: https://html.spec.whatwg.org/multipage/infrastructure.html#xml-compatible

XIOC detected URL: https://html.spec.whatwg.org/multipage/infrastructure.html#xml-compatible

extracted_from_files

URL
detected URL: https://html.spec.whatwg.org/multipage/dom.html#embedding-custom-non-visible-data-with-the-data-*-attributes)

XIOC detected URL: https://html.spec.whatwg.org/multipage/dom.html#embedding-custom-non-visible-data-with-the-data-*-attributes)

extracted_from_files

URL
detected URL: https://www.w3.org/TR/xhtml1/normative.html#strict)

XIOC detected URL: https://www.w3.org/TR/xhtml1/normative.html#strict)

extracted_from_files

URL
detected URL: http://www.w3.org/1999/xhtml';

XIOC detected URL: http://www.w3.org/1999/xhtml';

extracted_from_files

URL
detected URL: http://www.w3.org/2000/svg';

XIOC detected URL: http://www.w3.org/2000/svg';

extracted_from_files

URL
detected URL: http://www.w3.org/1998/Math/MathML';

XIOC detected URL: http://www.w3.org/1998/Math/MathML';

extracted_from_files

Hash
detected MD5 Hash: d9b143b9b8e468cbe4d719b7e641f655

XIOC detected MD5 Hash: d9b143b9b8e468cbe4d719b7e641f655

extracted_from_files

URL
detected URL: https://bugs.chromium.org/p/chromium/issues/detail?id=1305293

XIOC detected URL: https://bugs.chromium.org/p/chromium/issues/detail?id=1305293

extracted_from_files

URL
detected URL: https://github.com/sindresorhus/validate-element-name

XIOC detected URL: https://github.com/sindresorhus/validate-element-name

extracted_from_files

IP
detected Domain: description.is

XIOC detected Domain: description.is

extracted_from_files

Domain
detected Domain: opacityinput.off

XIOC detected Domain: opacityinput.off

extracted_from_files

Domain
detected Domain: mousedownevent.target

XIOC detected Domain: mousedownevent.target

extracted_from_files

Security Analysis Summary

Security Analysis Overview

This extension is a Firefox Add-ons extension published by Pablo Androetto. Version 1.3.14 has been analyzed by the Risky Plugins security platform, receiving a risk score of 100/100 (CRITICAL risk) based on 246 security findings.

Risk Assessment

This extension presents critical security risk. Severe issues were detected, potentially including malware indicators, exposed secrets, or dangerous behaviors. Installation is strongly discouraged until these issues are addressed.

Findings Breakdown

  • High: 73 finding(s)
  • Medium: 173 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

This extension is published by Pablo Androetto on the Firefox Add-ons marketplace. The extension has approximately 4 users.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions