Is "Worked Hunting" on Chrome Web Store Safe to Install?
Encontre os talentos ideais de forma rápida e eficaz com nossa extensão Search Enrichment para LinkedIn: Agora, não é mais necessário gastar horas em pesquisas extensas e repetitivas. Nossa ferramenta analisa detalhes específicos de suas vagas e sugere as melhores buscas personalizadas para você, permitindo que você identifique os melhores talentos de maneira eficiente - sem precisar pesquisar perfil por perfil. Aproveite a praticidade de encontrar o talento certo no menor tempo possível. Otimize seu processo de recrutamento e impulsione sua equipe com os melhores profissionais.
Risk Assessment
Analyzed109 security findings detected across all analyzers
Chrome extension requesting 8 permissions
Severity Breakdown
Finding Categories
YARA Rules Matched
8 rules(14 hits)Requested Permissions
8 permissionsAbout This Extension
Detailed Findings
17 totalYARA Rule Matches
8 rulesIndicators of Compromise
Network indicators, suspicious strings, and potential IoCs extracted during analysis
All Indicators · 89
detected Domain: message.data XIOC detected Domain: message.data
extracted_from_files
detected Domain: n.email XIOC detected Domain: n.email
extracted_from_files
detected Domain: t.total XIOC detected Domain: t.total
extracted_from_files
detected Domain: clients2.google.com XIOC detected Domain: clients2.google.com
extracted_from_files
detected Domain: app.worked.com.br XIOC detected Domain: app.worked.com.br
extracted_from_files
detected Domain: stagingfront.worked.com.br XIOC detected Domain: stagingfront.worked.com.br
extracted_from_files
detected Domain: obj.id XIOC detected Domain: obj.id
extracted_from_files
detected URL: https://www.linkedin.com/* XIOC detected URL: https://www.linkedin.com/*
extracted_from_files
detected Domain: o.data XIOC detected Domain: o.data
extracted_from_files
detected Domain: f.email XIOC detected Domain: f.email
extracted_from_files
detected Domain: t.basics.email XIOC detected Domain: t.basics.email
extracted_from_files
detected Domain: f.phone XIOC detected Domain: f.phone
extracted_from_files
detected Domain: linkedin.com XIOC detected Domain: linkedin.com
extracted_from_files
detected Domain: o.supportedlocales.map XIOC detected Domain: o.supportedlocales.map
extracted_from_files
detected Domain: e.country XIOC detected Domain: e.country
extracted_from_files
detected Domain: r.work XIOC detected Domain: r.work
extracted_from_files
detected Domain: o.sections.education XIOC detected Domain: o.sections.education
extracted_from_files
detected Domain: t.education XIOC detected Domain: t.education
extracted_from_files
detected Domain: r.education XIOC detected Domain: r.education
extracted_from_files
detected Domain: t.next XIOC detected Domain: t.next
extracted_from_files
detected Domain: r.data XIOC detected Domain: r.data
extracted_from_files
detected Domain: o.name XIOC detected Domain: o.name
extracted_from_files
detected Domain: m.total XIOC detected Domain: m.total
extracted_from_files
detected Domain: n.name XIOC detected Domain: n.name
extracted_from_files
detected Domain: n.date XIOC detected Domain: n.date
extracted_from_files
detected Domain: console.group XIOC detected Domain: console.group
extracted_from_files
detected Domain: sections.work XIOC detected Domain: sections.work
extracted_from_files
detected Domain: t.work XIOC detected Domain: t.work
extracted_from_files
detected Domain: a.data XIOC detected Domain: a.data
extracted_from_files
detected Domain: n.country XIOC detected Domain: n.country
extracted_from_files
detected Domain: t.basics.website XIOC detected Domain: t.basics.website
extracted_from_files
detected Domain: r.total XIOC detected Domain: r.total
extracted_from_files
detected Domain: g.sections.education XIOC detected Domain: g.sections.education
extracted_from_files
detected Domain: d.total XIOC detected Domain: d.total
extracted_from_files
detected Domain: g.sections.work XIOC detected Domain: g.sections.work
extracted_from_files
detected Domain: e.name XIOC detected Domain: e.name
extracted_from_files
detected Domain: a.courses XIOC detected Domain: a.courses
extracted_from_files
detected Domain: s.courses XIOC detected Domain: s.courses
extracted_from_files
detected Domain: e.company XIOC detected Domain: e.company
extracted_from_files
detected Domain: o.company XIOC detected Domain: o.company
extracted_from_files
detected Domain: o.website XIOC detected Domain: o.website
extracted_from_files
detected Domain: n.next XIOC detected Domain: n.next
extracted_from_files
detected Domain: com.linkedin.voyager.dash.identity.profile.education XIOC detected Domain: com.linkedin.voyager.dash.identity.profile.education
extracted_from_files
detected Domain: e.day XIOC detected Domain: e.day
extracted_from_files
detected Domain: n.click XIOC detected Domain: n.click
extracted_from_files
detected Domain: r.search XIOC detected Domain: r.search
extracted_from_files
detected Domain: e.data XIOC detected Domain: e.data
extracted_from_files
detected Domain: e.map XIOC detected Domain: e.map
extracted_from_files
detected Domain: t.skills.map XIOC detected Domain: t.skills.map
extracted_from_files
detected Domain: t.name XIOC detected Domain: t.name
extracted_from_files
detected Domain: this.next XIOC detected Domain: this.next
extracted_from_files
detected Domain: object.prototype.hasownproperty.call XIOC detected Domain: object.prototype.hasownproperty.call
extracted_from_files
detected Domain: object.prototype.tostring.call XIOC detected Domain: object.prototype.tostring.call
extracted_from_files
detected Domain: e.constructor.name XIOC detected Domain: e.constructor.name
extracted_from_files
detected Domain: github.com XIOC detected Domain: github.com
extracted_from_files
detected Domain: com.linkedin.voyager.identity.profile.education XIOC detected Domain: com.linkedin.voyager.identity.profile.education
extracted_from_files
detected Domain: n.details.city XIOC detected Domain: n.details.city
extracted_from_files
detected Domain: e.call XIOC detected Domain: e.call
extracted_from_files
detected Domain: n.call XIOC detected Domain: n.call
extracted_from_files
detected Domain: r.next XIOC detected Domain: r.next
extracted_from_files
detected Domain: r.call XIOC detected Domain: r.call
extracted_from_files
detected Domain: e.next XIOC detected Domain: e.next
extracted_from_files
detected Domain: a.next XIOC detected Domain: a.next
extracted_from_files
detected Domain: storage.basics.id XIOC detected Domain: storage.basics.id
extracted_from_files
detected Domain: location.city XIOC detected Domain: location.city
extracted_from_files
detected Domain: storage.work XIOC detected Domain: storage.work
extracted_from_files
detected Domain: storage.basics.location.city XIOC detected Domain: storage.basics.location.city
extracted_from_files
detected Domain: raw.githubusercontent.com XIOC detected Domain: raw.githubusercontent.com
extracted_from_files
detected Domain: twitter.com XIOC detected Domain: twitter.com
extracted_from_files
detected Domain: e.email XIOC detected Domain: e.email
extracted_from_files
detected URL: https://www.linkedin.com/voyager/api XIOC detected URL: https://www.linkedin.com/voyager/api
extracted_from_files
detected Domain: chrome.runtime.id XIOC detected Domain: chrome.runtime.id
extracted_from_files
detected Domain: tab.id XIOC detected Domain: tab.id
extracted_from_files
detected Domain: app.pipol.com.br XIOC detected Domain: app.pipol.com.br
extracted_from_files
detected Domain: chrome.sidepanel.open XIOC detected Domain: chrome.sidepanel.open
extracted_from_files
detected Domain: message.id XIOC detected Domain: message.id
extracted_from_files
detected Domain: storage.basics.name XIOC detected Domain: storage.basics.name
extracted_from_files
detected URL: https://twitter.com/ XIOC detected URL: https://twitter.com/
extracted_from_files
detected URL: https://www.linkedin.com/in/ XIOC detected URL: https://www.linkedin.com/in/
extracted_from_files
detected URL: https://www.linkedin.com/company/ XIOC detected URL: https://www.linkedin.com/company/
extracted_from_files
detected URL: https://raw.githubusercontent.com/jsonresume/resume-schema/v1.0.0/schema.json XIOC detected URL: https://raw.githubusercontent.com/jsonresume/resume-schema/v1.0.0/schema.json
extracted_from_files
detected URL: https://app.pipol.com.br XIOC detected URL: https://app.pipol.com.br
extracted_from_files
detected MD5 Hash: 99999999999999999999999999999999 XIOC detected MD5 Hash: 99999999999999999999999999999999
extracted_from_files
detected URL: https://app.pipol.com.br/extension XIOC detected URL: https://app.pipol.com.br/extension
extracted_from_files
detected URL: https://stagingfront.worked.com.br/* XIOC detected URL: https://stagingfront.worked.com.br/*
extracted_from_files
detected URL: https://app.worked.com.br/* XIOC detected URL: https://app.worked.com.br/*
extracted_from_files
detected URL: https://clients2.google.com/service/update2/crx XIOC detected URL: https://clients2.google.com/service/update2/crx
extracted_from_files
detected Domain: www.linkedin.com XIOC detected Domain: www.linkedin.com
extracted_from_files
detected Domain: o.date XIOC detected Domain: o.date
extracted_from_files
Security Analysis Summary
Security Analysis Overview
Worked Hunting is a Chrome Web Store extension published by [email protected]. Version 3.5.0 has been analyzed by the Risky Plugins security platform, receiving a risk score of 64.95/100 (MEDIUM risk) based on 109 security findings.
Risk Assessment
This extension presents high security risk. Significant concerns were identified during analysis. It is not recommended for use in sensitive or production environments without thorough review.
Findings Breakdown
- High: 14 finding(s)
- Medium: 95 finding(s)
What Was Analyzed
The security assessment covers multiple analysis categories:
- Malware Detection: YARA rule matching against 2,400+ malware signatures
- Secret Detection: Scanning for exposed API keys, tokens, and credentials
- Static Analysis: Code-level security analysis for common vulnerability patterns
- Network Analysis: Detection of suspicious network communications and endpoints
- Obfuscation Detection: Identification of code obfuscation techniques
Developer Information
Worked Hunting is published by [email protected] on the Chrome Web Store marketplace. The extension has approximately 21 users.
Recommendation
This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace
Samax: FinOps & Cloud Savings
[email protected]
Send to NotebookLM
[email protected]
Chat AI - Chat GPT 5 on all sites
[email protected]
SensePage
[email protected]
Auto Gmail - ChatGPT AI for email inbox
[email protected]
Page Locker
[email protected]