Is "Adobe Target VEC Helper" on Chrome Web Store Safe to Install?

[email protected] · chrome · v0.7.1

The VEC Helper browser extension for Chrome solves site-loading issues for which customers now rely on the Target Enhanced Experience Composer or third-party extensions. Benefits of using the VEC Helper extension: - All iframe busting headers, such as X-Frame-Options and Content-Security-Policy, are implicitly removed from the website. - If a webpage does not yet contain the Target at.js JavaScript library, you can use the extension to inject the library so you can author experiences for the website. You can then create activities and QA them using preview links. - Mobile Viewports are supported without the Enhanced Experience Composer (EEC). - Customers new to Target can use the extension to experiment with Target even if their IT developers have not yet implemented Target on their websites. - Partners servicing multiple customers' websites and Target accounts now have one simple mechanism to support VEC loading, instead of managing multiple rules in third-party tools. - With Chrome 80's change in the default behaviour of SameSite attribute for cookies. - Adobe Target - Visual Enhanced Composer functionality is fixed by adding the SameSite attribute to certain session cookies used by Adobe Target components. - Clients are now able to set the SameSite attribute to the value "None" for their own session cookies in order for them to be able to login while using VEC or EEC.

Risk Assessment

Analyzed
42.85
out of 100
MEDIUM

360 security findings detected across all analyzers

Chrome extension requesting 7 permissions

Severity Breakdown

0
Critical
85
High
275
Medium
0
Low
0
Info

Finding Categories

85
Malware Signatures
240
IoC Indicators

YARA Rules Matched

9 rules(85 hits)
postinstall obfuscation postinstall system command postinstall file manipulation postinstall network communication postinstall file download postinstall crypto operations NoUseWeakRandom credential env files postinstall registry modification

Requested Permissions

7 permissions
http://*/*
Dangerous
https://*/*
Dangerous
webRequest

Intercept, modify, and block all network requests

High
webRequestBlocking

Block network requests before they complete

High
activeTab
Medium
storage
Low
webNavigation
Low

About This Extension

The VEC Helper browser extension for Chrome solves site-loading issues for which customers now rely on the Target Enhanced Experience Composer or third-party extensions. Benefits of using the VEC Helper extension: - All iframe busting headers, such as X-Frame-Options and Content-Security-Policy, are implicitly removed from the website. - If a webpage does not yet contain the Target at.js JavaScript library, you can use the extension to inject the library so you can author experiences for the website. You can then create activities and QA them using preview links. - Mobile Viewports are supported without the Enhanced Experience Composer (EEC). - Customers new to Target can use the extension to experiment with Target even if their IT developers have not yet implemented Target on their websites. - Partners servicing multiple customers' websites and Target accounts now have one simple mechanism to support VEC loading, instead of managing multiple rules in third-party tools. - With Chrome 80's change in the default behaviour of SameSite attribute for cookies. - Adobe Target - Visual Enhanced Composer functionality is fixed by adding the SameSite attribute to certain session cookies used by Adobe Target components. - Clients are now able to set the SameSite attribute to the value "None" for their own session cookies in order for them to be able to login while using VEC or EEC.

Detailed Findings

85 total

YARA Rule Matches

9 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
38
IP Addresses
7
Domains
195
Strings
240

All Indicators · 240

Domain
detected Domain: props.style

XIOC detected Domain: props.style

extracted_from_files

Domain
detected Domain: a.data

XIOC detected Domain: a.data

extracted_from_files

Domain
detected Domain: this.call

XIOC detected Domain: this.call

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

IP
detected IP: 2.168.212.212

XIOC detected IP: 2.168.212.212

extracted_from_files

IP
detected IP: 7.3.1.33

XIOC detected IP: 7.3.1.33

extracted_from_files

IP
detected IP: 7.2.0.0

XIOC detected IP: 7.2.0.0

extracted_from_files

Domain
detected Domain: browser-polyfill.js.map

XIOC detected Domain: browser-polyfill.js.map

extracted_from_files

Domain
detected Domain: chrome.runtime.id

XIOC detected Domain: chrome.runtime.id

extracted_from_files

Domain
detected Domain: wrapper.call

XIOC detected Domain: wrapper.call

extracted_from_files

Domain
detected Domain: object.prototype.hasownproperty.call

XIOC detected Domain: object.prototype.hasownproperty.call

extracted_from_files

Domain
detected Domain: cdn.tt.omtrdc.net

XIOC detected Domain: cdn.tt.omtrdc.net

extracted_from_files

Domain
detected Domain: github.com

XIOC detected Domain: github.com

extracted_from_files

Domain
detected Domain: developer.mozilla.org

XIOC detected Domain: developer.mozilla.org

extracted_from_files

Domain
detected Domain: monitor.id

XIOC detected Domain: monitor.id

extracted_from_files

Domain
detected Domain: tab.id

XIOC detected Domain: tab.id

extracted_from_files

Domain
detected Domain: targettabs.map

XIOC detected Domain: targettabs.map

extracted_from_files

Domain
detected Domain: contexts.map

XIOC detected Domain: contexts.map

extracted_from_files

Domain
detected Domain: experiencecloud.adobe.com

XIOC detected Domain: experiencecloud.adobe.com

extracted_from_files

Domain
detected Domain: adobemc.com

XIOC detected Domain: adobemc.com

extracted_from_files

Domain
detected Domain: adobe.com

XIOC detected Domain: adobe.com

extracted_from_files

URL
detected Domain: url.host

XIOC detected Domain: url.host

extracted_from_files

Domain
detected Domain: sender.tab.id

XIOC detected Domain: sender.tab.id

extracted_from_files

Domain
detected Domain: request.author

XIOC detected Domain: request.author

extracted_from_files

Domain
detected Domain: headers.map

XIOC detected Domain: headers.map

extracted_from_files

Domain
detected Domain: header.name

XIOC detected Domain: header.name

extracted_from_files

Domain
detected Domain: agent.name

XIOC detected Domain: agent.name

extracted_from_files

Domain
detected Domain: hasalloydiv.id

XIOC detected Domain: hasalloydiv.id

extracted_from_files

Domain
detected Domain: library.name

XIOC detected Domain: library.name

extracted_from_files

Domain
detected Domain: background.js.map

XIOC detected Domain: background.js.map

extracted_from_files

URL
detected Domain: parsedurl.search

XIOC detected Domain: parsedurl.search

extracted_from_files

Domain
detected Domain: proxy.adobemc.com

XIOC detected Domain: proxy.adobemc.com

extracted_from_files

Domain
detected Domain: cookies.name

XIOC detected Domain: cookies.name

extracted_from_files

Domain
detected Domain: link.name

XIOC detected Domain: link.name

extracted_from_files

Domain
detected Domain: targetinfo.host

XIOC detected Domain: targetinfo.host

extracted_from_files

Domain
detected Domain: main.js.map

XIOC detected Domain: main.js.map

extracted_from_files

Domain
detected Domain: eventdata.author

XIOC detected Domain: eventdata.author

extracted_from_files

Domain
detected Domain: eventdata.id

XIOC detected Domain: eventdata.id

extracted_from_files

Domain
detected Domain: evt.data

XIOC detected Domain: evt.data

extracted_from_files

Domain
detected Domain: messages.show

XIOC detected Domain: messages.show

extracted_from_files

Domain
detected Domain: client.js.map

XIOC detected Domain: client.js.map

extracted_from_files

Domain
detected Domain: code.name

XIOC detected Domain: code.name

extracted_from_files

Domain
detected Domain: www.opensource.org

XIOC detected Domain: www.opensource.org

extracted_from_files

Domain
detected Domain: use.typekit.net

XIOC detected Domain: use.typekit.net

extracted_from_files

Domain
detected Domain: clients2.google.com

XIOC detected Domain: clients2.google.com

extracted_from_files

Domain
detected Domain: top.js.map

XIOC detected Domain: top.js.map

extracted_from_files

Domain
detected Domain: request.data

XIOC detected Domain: request.data

extracted_from_files

Domain
detected Domain: notificationcomponent.show

XIOC detected Domain: notificationcomponent.show

extracted_from_files

Domain
detected Domain: messages.is

XIOC detected Domain: messages.is

extracted_from_files

Domain
detected Domain: this.map

XIOC detected Domain: this.map

extracted_from_files

Domain
detected Domain: stackoverflow.com

XIOC detected Domain: stackoverflow.com

extracted_from_files

Domain
detected Domain: browserhacks.com

XIOC detected Domain: browserhacks.com

extracted_from_files

Domain
detected Domain: fb.me

XIOC detected Domain: fb.me

extracted_from_files

Domain
detected Domain: www.w3.org

XIOC detected Domain: www.w3.org

extracted_from_files

Domain
detected Domain: reactjs.org

XIOC detected Domain: reactjs.org

extracted_from_files

Domain
detected Domain: bugs.chromium.org

XIOC detected Domain: bugs.chromium.org

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: this.target

XIOC detected Domain: this.target

extracted_from_files

Domain
detected Domain: b.call

XIOC detected Domain: b.call

extracted_from_files

Domain
detected Domain: array.prototype.slice.call

XIOC detected Domain: array.prototype.slice.call

extracted_from_files

Domain
detected Domain: propisenumerable.call

XIOC detected Domain: propisenumerable.call

extracted_from_files

Domain
detected Domain: hasownproperty.call

XIOC detected Domain: hasownproperty.call

extracted_from_files

Domain
detected Domain: cssmapping.sources.map

XIOC detected Domain: cssmapping.sources.map

extracted_from_files

Domain
detected Domain: f.call

XIOC detected Domain: f.call

extracted_from_files

Domain
detected Domain: e.call

XIOC detected Domain: e.call

extracted_from_files

Domain
detected Domain: a.target

XIOC detected Domain: a.target

extracted_from_files

Domain
detected Domain: e.data

XIOC detected Domain: e.data

extracted_from_files

Domain
detected Domain: mozilla.org

XIOC detected Domain: mozilla.org

extracted_from_files

IP
detected IP: ::bef

XIOC detected IP: ::bef

extracted_from_files

IP
detected IP: ::af

XIOC detected IP: ::af

extracted_from_files

Domain
detected Domain: a.style

XIOC detected Domain: a.style

extracted_from_files

Domain
detected Domain: de.select

XIOC detected Domain: de.select

extracted_from_files

Domain
detected Domain: id.call

XIOC detected Domain: id.call

extracted_from_files

Domain
detected Domain: c.target

XIOC detected Domain: c.target

extracted_from_files

Domain
detected Domain: rc.call

XIOC detected Domain: rc.call

extracted_from_files

Domain
detected Domain: b.name

XIOC detected Domain: b.name

extracted_from_files

Domain
detected Domain: a.name

XIOC detected Domain: a.name

extracted_from_files

Domain
detected Domain: k.next

XIOC detected Domain: k.next

extracted_from_files

Domain
detected Domain: a.call

XIOC detected Domain: a.call

extracted_from_files

Domain
detected Domain: c.lastcapturedupdate.next

XIOC detected Domain: c.lastcapturedupdate.next

extracted_from_files

Domain
detected Domain: a.lastupdate.next

XIOC detected Domain: a.lastupdate.next

extracted_from_files

Domain
detected Domain: ef.next

XIOC detected Domain: ef.next

extracted_from_files

Domain
detected Domain: b.is

XIOC detected Domain: b.is

extracted_from_files

Domain
detected Domain: b.style

XIOC detected Domain: b.style

extracted_from_files

Domain
detected Domain: r.next

XIOC detected Domain: r.next

extracted_from_files

Domain
detected Domain: q.next

XIOC detected Domain: q.next

extracted_from_files

Domain
detected Domain: g.next

XIOC detected Domain: g.next

extracted_from_files

Domain
detected Domain: l.call

XIOC detected Domain: l.call

extracted_from_files

Domain
detected Domain: object.prototype.tostring.call

XIOC detected Domain: object.prototype.tostring.call

extracted_from_files

Domain
detected Domain: c.call

XIOC detected Domain: c.call

extracted_from_files

Domain
detected Domain: b.lastupdate.next

XIOC detected Domain: b.lastupdate.next

extracted_from_files

Domain
detected Domain: c.compare

XIOC detected Domain: c.compare

extracted_from_files

Domain
detected Domain: f.next

XIOC detected Domain: f.next

extracted_from_files

Domain
detected Domain: b.next

XIOC detected Domain: b.next

extracted_from_files

Domain
detected Domain: a.next

XIOC detected Domain: a.next

extracted_from_files

Domain
detected Domain: h.next

XIOC detected Domain: h.next

extracted_from_files

Domain
detected Domain: d.next

XIOC detected Domain: d.next

extracted_from_files

Domain
detected Domain: e.next

XIOC detected Domain: e.next

extracted_from_files

Domain
detected Domain: l.next

XIOC detected Domain: l.next

extracted_from_files

Domain
detected Domain: r.top

XIOC detected Domain: r.top

extracted_from_files

Domain
detected Domain: c.is

XIOC detected Domain: c.is

extracted_from_files

Domain
detected Domain: a.memoizedprops.style

XIOC detected Domain: a.memoizedprops.style

extracted_from_files

Domain
detected Domain: f.style

XIOC detected Domain: f.style

extracted_from_files

Domain
detected Domain: d.name

XIOC detected Domain: d.name

extracted_from_files

Domain
detected Domain: c.next

XIOC detected Domain: c.next

extracted_from_files

Domain
detected Domain: u.now

XIOC detected Domain: u.now

extracted_from_files

Domain
detected Domain: t.now

XIOC detected Domain: t.now

extracted_from_files

Domain
detected Domain: window.date

XIOC detected Domain: window.date

extracted_from_files

Domain
detected Domain: a.func.call

XIOC detected Domain: a.func.call

extracted_from_files

Domain
detected Domain: k.call

XIOC detected Domain: k.call

extracted_from_files

Domain
detected Domain: g.call

XIOC detected Domain: g.call

extracted_from_files

Domain
detected Domain: c.name

XIOC detected Domain: c.name

extracted_from_files

Domain
detected Domain: obj.media

XIOC detected Domain: obj.media

extracted_from_files

Domain
detected Domain: newobj.media

XIOC detected Domain: newobj.media

extracted_from_files

Domain
detected Domain: item.parts

XIOC detected Domain: item.parts

extracted_from_files

Domain
detected Domain: domstyle.id

XIOC detected Domain: domstyle.id

extracted_from_files

Domain
detected Domain: domstyle.parts

XIOC detected Domain: domstyle.parts

extracted_from_files

Domain
detected Domain: item.id

XIOC detected Domain: item.id

extracted_from_files

Domain
detected Domain: gettarget.call

XIOC detected Domain: gettarget.call

extracted_from_files

Domain
detected Domain: tnewobj.media

XIOC detected Domain: tnewobj.media

extracted_from_files

Domain
detected Domain: tdomstyle.parts

XIOC detected Domain: tdomstyle.parts

extracted_from_files

Domain
detected Domain: nf.style

XIOC detected Domain: nf.style

extracted_from_files

Domain
detected Domain: module.id

XIOC detected Domain: module.id

extracted_from_files

Domain
detected Domain: settings.js.map

XIOC detected Domain: settings.js.map

extracted_from_files

Domain
detected Domain: config.name

XIOC detected Domain: config.name

extracted_from_files

Domain
detected Domain: location.host

XIOC detected Domain: location.host

extracted_from_files

Domain
detected Domain: gmail.com

XIOC detected Domain: gmail.com

extracted_from_files

Domain
detected Domain: www.adobe.com

XIOC detected Domain: www.adobe.com

extracted_from_files

Domain
detected Domain: pegjs.org

XIOC detected Domain: pegjs.org

extracted_from_files

Domain
detected Domain: jedwatson.github.io

XIOC detected Domain: jedwatson.github.io

extracted_from_files

Domain
detected Domain: www.apache.org

XIOC detected Domain: www.apache.org

extracted_from_files

Domain
detected Domain: typekit.com

XIOC detected Domain: typekit.com

extracted_from_files

Domain
detected Domain: module.hot

XIOC detected Domain: module.hot

extracted_from_files

Domain
detected Domain: hasown.call

XIOC detected Domain: hasown.call

extracted_from_files

Domain
detected Domain: handler.call

XIOC detected Domain: handler.call

extracted_from_files

Domain
detected Domain: iterator.next

XIOC detected Domain: iterator.next

extracted_from_files

URL
detected URL: https://github.com/mozilla/webextension-polyfill/issues/130

XIOC detected URL: https://github.com/mozilla/webextension-polyfill/issues/130

extracted_from_files

Domain
detected Domain: props.name

XIOC detected Domain: props.name

extracted_from_files

Domain
detected Domain: this.buttonref.click

XIOC detected Domain: this.buttonref.click

extracted_from_files

Domain
detected Domain: object.prototype.propertyisenumerable.call

XIOC detected Domain: object.prototype.propertyisenumerable.call

extracted_from_files

Domain
detected Domain: spectrum-button--warning.is

XIOC detected Domain: spectrum-button--warning.is

extracted_from_files

Domain
detected Domain: spectrum-button--secondary.is

XIOC detected Domain: spectrum-button--secondary.is

extracted_from_files

Domain
detected Domain: spectrum-button--primary.is

XIOC detected Domain: spectrum-button--primary.is

extracted_from_files

Domain
detected Domain: spectrum-button--cta.is

XIOC detected Domain: spectrum-button--cta.is

extracted_from_files

Domain
detected Domain: spectrum-clearbutton.is

XIOC detected Domain: spectrum-clearbutton.is

extracted_from_files

Domain
detected Domain: n.spectrum-fieldbutton.is

XIOC detected Domain: n.spectrum-fieldbutton.is

extracted_from_files

Domain
detected Domain: spectrum-fieldbutton.is

XIOC detected Domain: spectrum-fieldbutton.is

extracted_from_files

Domain
detected Domain: spectrum-actionbutton.is-selected.is

XIOC detected Domain: spectrum-actionbutton.is-selected.is

extracted_from_files

Domain
detected Domain: spectrum-actionbutton.is

XIOC detected Domain: spectrum-actionbutton.is

extracted_from_files

Domain
detected Domain: spectrum-button--secondary.spectrum-button--quiet.is

XIOC detected Domain: spectrum-button--secondary.spectrum-button--quiet.is

extracted_from_files

Domain
detected Domain: spectrum-button--primary.spectrum-button--quiet.is

XIOC detected Domain: spectrum-button--primary.spectrum-button--quiet.is

extracted_from_files

Domain
detected Domain: spectrum-clearbutton--overbackground.is

XIOC detected Domain: spectrum-clearbutton--overbackground.is

extracted_from_files

Domain
detected Domain: spectrum-button--overbackground.spectrum-button--quiet.is

XIOC detected Domain: spectrum-button--overbackground.spectrum-button--quiet.is

extracted_from_files

Domain
detected Domain: spectrum-button--overbackground.is

XIOC detected Domain: spectrum-button--overbackground.is

extracted_from_files

Domain
detected Domain: spectrum-fieldbutton.is-focused.is

XIOC detected Domain: spectrum-fieldbutton.is-focused.is

extracted_from_files

Domain
detected Domain: spectrum-fieldbutton.focus-ring.is

XIOC detected Domain: spectrum-fieldbutton.focus-ring.is

extracted_from_files

Domain
detected Domain: spectrum-logicbutton--or.is

XIOC detected Domain: spectrum-logicbutton--or.is

extracted_from_files

Domain
detected Domain: spectrum-logicbutton--and.is

XIOC detected Domain: spectrum-logicbutton--and.is

extracted_from_files

Domain
detected Domain: spectrum-button--warning.spectrum-button--quiet.is

XIOC detected Domain: spectrum-button--warning.spectrum-button--quiet.is

extracted_from_files

Domain
detected Domain: spectrum-actionbutton--quiet.is-selected.is

XIOC detected Domain: spectrum-actionbutton--quiet.is-selected.is

extracted_from_files

Domain
detected Domain: spectrum-actionbutton--quiet.is

XIOC detected Domain: spectrum-actionbutton--quiet.is

extracted_from_files

Domain
detected Domain: spectrum-fieldbutton--quiet.is-selected.is

XIOC detected Domain: spectrum-fieldbutton--quiet.is-selected.is

extracted_from_files

Domain
detected Domain: spectrum-fieldbutton--quiet.is-focused.is

XIOC detected Domain: spectrum-fieldbutton--quiet.is-focused.is

extracted_from_files

Domain
detected Domain: spectrum-fieldbutton--quiet.focus-ring.is

XIOC detected Domain: spectrum-fieldbutton--quiet.focus-ring.is

extracted_from_files

Domain
detected Domain: spectrum-fieldbutton--quiet.is

XIOC detected Domain: spectrum-fieldbutton--quiet.is

extracted_from_files

Domain
detected Domain: spectrum-fieldbutton.is-invalid.is

XIOC detected Domain: spectrum-fieldbutton.is-invalid.is

extracted_from_files

Domain
detected Domain: spectrum-fieldbutton.is-selected.is

XIOC detected Domain: spectrum-fieldbutton.is-selected.is

extracted_from_files

Domain
detected Domain: active.is

XIOC detected Domain: active.is

extracted_from_files

Domain
detected Domain: element.id

XIOC detected Domain: element.id

extracted_from_files

Domain
detected Domain: this.currentplural.id

XIOC detected Domain: this.currentplural.id

extracted_from_files

Domain
detected Domain: parser.js.map

XIOC detected Domain: parser.js.map

extracted_from_files

Domain
detected Domain: this.name

XIOC detected Domain: this.name

extracted_from_files

Domain
detected Domain: spectrum-tool.is-selected.is

XIOC detected Domain: spectrum-tool.is-selected.is

extracted_from_files

Domain
detected Domain: spectrum-tool.is

XIOC detected Domain: spectrum-tool.is

extracted_from_files

Domain
detected Domain: spectrum-fieldbutton--quiet.is-invalid.is

XIOC detected Domain: spectrum-fieldbutton--quiet.is-invalid.is

extracted_from_files

Domain
detected Domain: core.js.map

XIOC detected Domain: core.js.map

extracted_from_files

Domain
detected Domain: hop.call

XIOC detected Domain: hop.call

extracted_from_files

Domain
detected Domain: part.id

XIOC detected Domain: part.id

extracted_from_files

Domain
detected Domain: compiler.js.map

XIOC detected Domain: compiler.js.map

extracted_from_files

Domain
detected Domain: this.id

XIOC detected Domain: this.id

extracted_from_files

Domain
detected Domain: formats.date

XIOC detected Domain: formats.date

extracted_from_files

Domain
detected Domain: format.style

XIOC detected Domain: format.style

extracted_from_files

Domain
detected Domain: item.prototype.run

XIOC detected Domain: item.prototype.run

extracted_from_files

Domain
detected Domain: this.fun

XIOC detected Domain: this.fun

extracted_from_files

Domain
detected Domain: cachedcleartimeout.call

XIOC detected Domain: cachedcleartimeout.call

extracted_from_files

Domain
detected Domain: cachedsettimeout.call

XIOC detected Domain: cachedsettimeout.call

extracted_from_files

Domain
detected Domain: utils.js.map

XIOC detected Domain: utils.js.map

extracted_from_files

Domain
detected Domain: es5.js.map

XIOC detected Domain: es5.js.map

extracted_from_files

Domain
detected Domain: en.js.map

XIOC detected Domain: en.js.map

extracted_from_files

Domain
detected Domain: nitem.prototype.run

XIOC detected Domain: nitem.prototype.run

extracted_from_files

Domain
detected Domain: popup.js.map

XIOC detected Domain: popup.js.map

extracted_from_files

Domain
detected Domain: this.props.allowedconfigs.map

XIOC detected Domain: this.props.allowedconfigs.map

extracted_from_files

Domain
detected Domain: cookieconfig.name

XIOC detected Domain: cookieconfig.name

extracted_from_files

Domain
detected Domain: modes.target

XIOC detected Domain: modes.target

extracted_from_files

Domain
detected Domain: err.name

XIOC detected Domain: err.name

extracted_from_files

Domain
detected Domain: process.off

XIOC detected Domain: process.off

extracted_from_files

URL
detected URL: http://mozilla.org/MPL/2.0/.

XIOC detected URL: http://mozilla.org/MPL/2.0/.

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

Domain
detected Domain: components.js.map

XIOC detected Domain: components.js.map

extracted_from_files

Domain
detected Domain: new.target

XIOC detected Domain: new.target

extracted_from_files

Domain
detected Domain: n.at

XIOC detected Domain: n.at

extracted_from_files

Domain
detected Domain: polymer.github.io

XIOC detected Domain: polymer.github.io

extracted_from_files

Domain
detected Domain: nprocess.off

XIOC detected Domain: nprocess.off

extracted_from_files

URL
detected URL: http://polymer.github.io/CONTRIBUTORS.txt

XIOC detected URL: http://polymer.github.io/CONTRIBUTORS.txt

extracted_from_files

URL
detected URL: http://polymer.github.io/AUTHORS.txt

XIOC detected URL: http://polymer.github.io/AUTHORS.txt

extracted_from_files

Hash
detected MD5 Hash: e71d8692f65334173fee715c222cb805

XIOC detected MD5 Hash: e71d8692f65334173fee715c222cb805

extracted_from_files

URL
detected URL: https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/runtime/onMessage)

XIOC detected URL: https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/runtime/onMessage)

extracted_from_files

URL
detected URL: http://cdn.tt.omtrdc.net/cdn/target.js

XIOC detected URL: http://cdn.tt.omtrdc.net/cdn/target.js

extracted_from_files

URL
detected URL: http://www.w3.org/1999/xlink

XIOC detected URL: http://www.w3.org/1999/xlink

extracted_from_files

URL
detected URL: https://reactjs.org/docs/error-decoder.html?invariant=

XIOC detected URL: https://reactjs.org/docs/error-decoder.html?invariant=

extracted_from_files

URL
detected URL: https://bugs.chromium.org/p/v8/issues/detail?id=3056

XIOC detected URL: https://bugs.chromium.org/p/v8/issues/detail?id=3056

extracted_from_files

URL
detected URL: https://bugs.chromium.org/p/v8/issues/detail?id=4118

XIOC detected URL: https://bugs.chromium.org/p/v8/issues/detail?id=4118

extracted_from_files

URL
detected URL: http://www.opensource.org/licenses/mit-license.php

XIOC detected URL: http://www.opensource.org/licenses/mit-license.php

extracted_from_files

URL
detected URL: https://use.typekit.net;

XIOC detected URL: https://use.typekit.net;

extracted_from_files

URL
detected URL: https://*.adobe.com/content/mac/*/target/activities.html*

XIOC detected URL: https://*.adobe.com/content/mac/*/target/activities.html*

extracted_from_files

URL
detected URL: http://www.w3.org/1999/xhtml

XIOC detected URL: http://www.w3.org/1999/xhtml

extracted_from_files

URL
detected URL: http://www.w3.org/1998/Math/MathML

XIOC detected URL: http://www.w3.org/1998/Math/MathML

extracted_from_files

URL
detected URL: http://www.w3.org/2000/svg

XIOC detected URL: http://www.w3.org/2000/svg

extracted_from_files

URL
detected URL: http://www.w3.org/XML/1998/namespace

XIOC detected URL: http://www.w3.org/XML/1998/namespace

extracted_from_files

URL
detected URL: http://stackoverflow.com/a/26603875

XIOC detected URL: http://stackoverflow.com/a/26603875

extracted_from_files

URL
detected URL: https://github.com/webpack-contrib/style-loader#insertat)

XIOC detected URL: https://github.com/webpack-contrib/style-loader#insertat)

extracted_from_files

URL
detected URL: https://github.com/webpack-contrib/style-loader/issues/177

XIOC detected URL: https://github.com/webpack-contrib/style-loader/issues/177

extracted_from_files

URL
detected URL: http://browserhacks.com/#hack-e71d8692f65334173fee715c222cb805

XIOC detected URL: http://browserhacks.com/#hack-e71d8692f65334173fee715c222cb805

extracted_from_files

URL
detected URL: https://fb.me/react-polyfills

XIOC detected URL: https://fb.me/react-polyfills

extracted_from_files

URL
detected URL: https://github.com/rwu823/react-addons-text-content

XIOC detected URL: https://github.com/rwu823/react-addons-text-content

extracted_from_files

URL
detected URL: https://use.typekit.net/

XIOC detected URL: https://use.typekit.net/

extracted_from_files

URL
detected URL: http://www.apache.org/licenses/LICENSE-2.0

XIOC detected URL: http://www.apache.org/licenses/LICENSE-2.0

extracted_from_files

URL
detected URL: https://typekit.com/account/kits

XIOC detected URL: https://typekit.com/account/kits

extracted_from_files

URL
detected URL: https://www.adobe.com/go/vec-helper-browser-extension',

XIOC detected URL: https://www.adobe.com/go/vec-helper-browser-extension',

extracted_from_files

URL
detected URL: http://fb.me/prop-types-in-prod

XIOC detected URL: http://fb.me/prop-types-in-prod

extracted_from_files

URL
detected URL: http://fb.me/use-check-prop-types'

XIOC detected URL: http://fb.me/use-check-prop-types'

extracted_from_files

URL
detected URL: http://pegjs.org/

XIOC detected URL: http://pegjs.org/

extracted_from_files

URL
detected URL: http://jedwatson.github.io/classnames

XIOC detected URL: http://jedwatson.github.io/classnames

extracted_from_files

URL
detected URL: http://polymer.github.io/LICENSE.txt

XIOC detected URL: http://polymer.github.io/LICENSE.txt

extracted_from_files

URL
detected URL: https://www.adobe.com/go/vec-helper-browser-extension

XIOC detected URL: https://www.adobe.com/go/vec-helper-browser-extension

extracted_from_files

URL
detected URL: http://polymer.github.io/PATENTS.txt

XIOC detected URL: http://polymer.github.io/PATENTS.txt

extracted_from_files

URL
detected URL: http://*.adobe.com/content/mac/*/target/activities.html*

XIOC detected URL: http://*.adobe.com/content/mac/*/target/activities.html*

extracted_from_files

URL
detected URL: https://clients2.google.com/service/update2/crx

XIOC detected URL: https://clients2.google.com/service/update2/crx

extracted_from_files

Domain
detected Domain: b.data

XIOC detected Domain: b.data

extracted_from_files

IP
detected IP: 7.0.0.187

XIOC detected IP: 7.0.0.187

extracted_from_files

Security Analysis Summary

Security Analysis Overview

Adobe Target VEC Helper is a Chrome Web Store extension published by [email protected]. Version 0.7.1 has been analyzed by the Risky Plugins security platform, receiving a risk score of 42.85/100 (MEDIUM risk) based on 360 security findings.

Risk Assessment

This extension presents moderate security risk. Several findings were detected that may warrant attention. Users should carefully review the permissions and findings before installation.

Findings Breakdown

  • High: 85 finding(s)
  • Medium: 275 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

Adobe Target VEC Helper is published by [email protected] on the Chrome Web Store marketplace. The extension has approximately 9K users.

Recommendation

Exercise caution with this extension. Review the detailed findings and ensure the requested permissions align with the extension's stated functionality before installation.

Frequently Asked Questions