Is "Cloud Hex Text Editor" on Chrome Web Store Safe to Install?

[email protected] · chrome · v1.0.2.3

This hex and text editor allows you to view and edit a file in text/hexadecimal format. This app is an online hex and nano text editor running in your web browser. The main purpose of this app is editing and analyzing text and binary files. Linux based text and hex editors can be accessed and used from a browser without installation. You can open, save, compare, analyze, decode binary data. It also searches for headers of known formats such as JPEG, PNG, MP3, etc. You can search, scroll, make edits in the file itself. It's absolutely free for those who want to edit a text and binary file.

Risk Assessment

Analyzed
54.02
out of 100
MEDIUM

30 security findings detected across all analyzers

Severity Breakdown

0
Critical
7
High
23
Medium
0
Low
0
Info

Finding Categories

7
Malware
3
Network
20
IoC Indicators

YARA Rules Matched

6 rules(7 hits)
postinstall system command postinstall crypto operations postinstall file manipulation postinstall network communication postinstall file download postinstall obfuscation

About This Extension

This hex and text editor allows you to view and edit a file in text/hexadecimal format. This app is an online hex and nano text editor running in your web browser. The main purpose of this app is editing and analyzing text and binary files. Linux based text and hex editors can be accessed and used from a browser without installation. You can open, save, compare, analyze, decode binary data. It also searches for headers of known formats such as JPEG, PNG, MP3, etc. You can search, scroll, make edits in the file itself. It's absolutely free for those who want to edit a text and binary file.

Detailed Findings

10 total

YARA Rule Matches

6 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
5
IP Addresses
2
Domains
13
Strings
20

All Indicators · 20

IP
detected IP: 88.0.0.0

XIOC detected IP: 88.0.0.0

extracted_from_files

URL
detected URL: http://jimmac.musichall.cz

XIOC detected URL: http://jimmac.musichall.cz

extracted_from_files

URL
detected URL: http://www.gimp.orgg

XIOC detected URL: http://www.gimp.orgg

extracted_from_files

URL
detected URL: https://developer.chrome.com/docs/extensions/reference/storage/

XIOC detected URL: https://developer.chrome.com/docs/extensions/reference/storage/

extracted_from_files

URL
detected URL: https://thetimetube.herokuapp.com/hexedit/

XIOC detected URL: https://thetimetube.herokuapp.com/hexedit/

extracted_from_files

URL
detected URL: http://clients2.google.com/service/update2/crx

XIOC detected URL: http://clients2.google.com/service/update2/crx

extracted_from_files

Domain
detected Domain: chrome.runtime.id

XIOC detected Domain: chrome.runtime.id

extracted_from_files

Domain
detected Domain: window.open

XIOC detected Domain: window.open

extracted_from_files

Domain
detected Domain: win.id

XIOC detected Domain: win.id

extracted_from_files

Domain
detected Domain: tab.id

XIOC detected Domain: tab.id

extracted_from_files

Domain
detected Domain: obj.style.top

XIOC detected Domain: obj.style.top

extracted_from_files

Domain
detected Domain: obj.style

XIOC detected Domain: obj.style

extracted_from_files

Domain
detected Domain: clients2.google.com

XIOC detected Domain: clients2.google.com

extracted_from_files

IP
detected IP: 1.0.2.3

XIOC detected IP: 1.0.2.3

extracted_from_files

Domain
detected Domain: www.inkscape.org

XIOC detected Domain: www.inkscape.org

extracted_from_files

Domain
detected Domain: jimmac.musichall.cz

XIOC detected Domain: jimmac.musichall.cz

extracted_from_files

Domain
detected Domain: ajaxload.info

XIOC detected Domain: ajaxload.info

extracted_from_files

Domain
detected Domain: www.loadinfo.net

XIOC detected Domain: www.loadinfo.net

extracted_from_files

Domain
detected Domain: developer.chrome.com

XIOC detected Domain: developer.chrome.com

extracted_from_files

Domain
detected Domain: thetimetube.herokuapp.com

XIOC detected Domain: thetimetube.herokuapp.com

extracted_from_files

Security Analysis Summary

Security Analysis Overview

Cloud Hex Text Editor is a Chrome Web Store extension published by [email protected]. Version 1.0.2.3 has been analyzed by the Risky Plugins security platform, receiving a risk score of 54.02/100 (MEDIUM risk) based on 30 security findings.

Risk Assessment

This extension presents moderate security risk. Several findings were detected that may warrant attention. Users should carefully review the permissions and findings before installation.

Findings Breakdown

  • High: 7 finding(s)
  • Medium: 23 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

Cloud Hex Text Editor is published by [email protected] on the Chrome Web Store marketplace. The extension has approximately 866 users.

Recommendation

Exercise caution with this extension. Review the detailed findings and ensure the requested permissions align with the extension's stated functionality before installation.

Frequently Asked Questions