Is "Open in Brave Browser" on Firefox Add-ons Safe to Install?
Open current page, link, or all tabs in the Brave browser. "Open in Brave" extension is meant to open the current tab or links inside the current tab in Brave browser. Using this extension you can send links to the Brave browser without the need to manually copy and paste links. This extension also offers open all tabs in the destination browser. Optionally you can close the tab that is opened in the destination browser too. If a Brave instance is already opened, then the link is opened in a new browser tab, however, if Brave is not opened, a new Brave instance is opened and then the link is sent. For FAQs please visit: https://add0n.com/open-in.html --- Note 1. For this extension to open links in the Brave browser you will need to install a minimal native client. The instruction to install the native client is displayed once a link opening is requested. There are two short video tutorials in the screenshot section for Windows, Linux, and Mac operation systems if you want to see the installation steps of the native client. 2. The native client currently only supports Mac, Windows and Linux operating systems. There is no support for other OSs at the moment.
Risk Assessment
Analyzed85 security findings detected across all analyzers
Firefox extension requesting 7 permissions
Severity Breakdown
Finding Categories
YARA Rules Matched
8 rules(22 hits)Requested Permissions
7 permissionsExchange messages with programs outside the browser
Access and modify data on every website you visit
Manage, modify, and monitor downloads
About This Extension
Detailed Findings
24 totalYARA Rule Matches
8 rulesIndicators of Compromise
Network indicators, suspicious strings, and potential IoCs extracted during analysis
All Indicators · 59
detected Domain: urls.map XIOC detected Domain: urls.map
extracted_from_files
detected Domain: www.w3.org XIOC detected Domain: www.w3.org
extracted_from_files
detected URL: https://webextension.org/listing/open-in.html#faq17 XIOC detected URL: https://webextension.org/listing/open-in.html#faq17
extracted_from_files
detected URL: https://webextension.org/listing/open-in.html?from=brave XIOC detected URL: https://webextension.org/listing/open-in.html?from=brave
extracted_from_files
detected MD5 Hash: 0db2db371d260c17859d7ad8f09cb0cf XIOC detected MD5 Hash: 0db2db371d260c17859d7ad8f09cb0cf
extracted_from_files
detected URL: https://github.com/andy-portmen/native-client/releases'); XIOC detected URL: https://github.com/andy-portmen/native-client/releases');
extracted_from_files
detected URL: http://www.w3.org/2000/svg XIOC detected URL: http://www.w3.org/2000/svg
extracted_from_files
detected URL: http://www.w3.org/1999/xlink XIOC detected URL: http://www.w3.org/1999/xlink
extracted_from_files
detected URL: http://www.w3.org/1999/02/22-rdf-syntax-ns# XIOC detected URL: http://www.w3.org/1999/02/22-rdf-syntax-ns#
extracted_from_files
detected URL: http://ns.adobe.com/tiff/1.0/ XIOC detected URL: http://ns.adobe.com/tiff/1.0/
extracted_from_files
detected URL: https://www.google') XIOC detected URL: https://www.google')
extracted_from_files
detected URL: https://www.google.com/, XIOC detected URL: https://www.google.com/,
extracted_from_files
detected URL: https://github.com/andy-portmen/native-client XIOC detected URL: https://github.com/andy-portmen/native-client
extracted_from_files
detected URL: https://www.chromium.org/for-testers/enable-logging XIOC detected URL: https://www.chromium.org/for-testers/enable-logging
extracted_from_files
detected URL: https://developer.mozilla.org/docs/Tools/Browser_Console XIOC detected URL: https://developer.mozilla.org/docs/Tools/Browser_Console
extracted_from_files
detected URL: https://www.youtube.com/watch?v=yZAoy8SOd7o XIOC detected URL: https://www.youtube.com/watch?v=yZAoy8SOd7o
extracted_from_files
detected Domain: window.top XIOC detected Domain: window.top
extracted_from_files
detected URL: https://api.github.com/repos/andy-portmen/*'] XIOC detected URL: https://api.github.com/repos/andy-portmen/*']
extracted_from_files
detected URL: https://api.github.com/repos/andy-portmen/native-client/releases/latest'); XIOC detected URL: https://api.github.com/repos/andy-portmen/native-client/releases/latest');
extracted_from_files
detected Domain: sender.tab.id XIOC detected Domain: sender.tab.id
extracted_from_files
detected Domain: date.now XIOC detected Domain: date.now
extracted_from_files
detected URL: http://addons.mozilla.org/ca/crl.pem0N XIOC detected URL: http://addons.mozilla.org/ca/crl.pem0N
extracted_from_files
detected URL: http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd' XIOC detected URL: http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd'
extracted_from_files
detected URL: https://github.com/andy-portmen/native-client/releases XIOC detected URL: https://github.com/andy-portmen/native-client/releases
extracted_from_files
detected Domain: app.id XIOC detected Domain: app.id
extracted_from_files
detected IP: :: XIOC detected IP: ::
extracted_from_files
detected Domain: app.runtime.windows.name XIOC detected Domain: app.runtime.windows.name
extracted_from_files
detected Domain: tabs.map XIOC detected Domain: tabs.map
extracted_from_files
detected Domain: t.id XIOC detected Domain: t.id
extracted_from_files
detected Domain: tab.id XIOC detected Domain: tab.id
extracted_from_files
detected Domain: app.locale.call XIOC detected Domain: app.locale.call
extracted_from_files
detected Domain: www.google XIOC detected Domain: www.google
extracted_from_files
detected Domain: www.google.com XIOC detected Domain: www.google.com
extracted_from_files
detected Domain: bing.com XIOC detected Domain: bing.com
extracted_from_files
detected Domain: webextension.org XIOC detected Domain: webextension.org
extracted_from_files
detected Domain: app.locale.name XIOC detected Domain: app.locale.name
extracted_from_files
detected Domain: app.runtime.linux.name XIOC detected Domain: app.runtime.linux.name
extracted_from_files
detected Domain: console.info XIOC detected Domain: console.info
extracted_from_files
detected Domain: location.search XIOC detected Domain: location.search
extracted_from_files
detected Domain: notify.show XIOC detected Domain: notify.show
extracted_from_files
detected Domain: req.open XIOC detected Domain: req.open
extracted_from_files
detected Domain: chrome.downloads.download XIOC detected Domain: chrome.downloads.download
extracted_from_files
detected Domain: a.name XIOC detected Domain: a.name
extracted_from_files
detected Domain: ns.adobe.com XIOC detected Domain: ns.adobe.com
extracted_from_files
detected URL: https://www.youtube.com/watch?v=2asPoW2gJ-c XIOC detected URL: https://www.youtube.com/watch?v=2asPoW2gJ-c
extracted_from_files
detected Domain: github.com XIOC detected Domain: github.com
extracted_from_files
detected Domain: www.chromium.org XIOC detected Domain: www.chromium.org
extracted_from_files
detected Domain: developer.mozilla.org XIOC detected Domain: developer.mozilla.org
extracted_from_files
detected Domain: www.youtube.com XIOC detected Domain: www.youtube.com
extracted_from_files
detected Domain: install.sh XIOC detected Domain: install.sh
extracted_from_files
detected Domain: uninstall.sh XIOC detected Domain: uninstall.sh
extracted_from_files
detected Domain: api.github.com XIOC detected Domain: api.github.com
extracted_from_files
detected IP: ::af XIOC detected IP: ::af
extracted_from_files
detected Domain: signingca1.addons.mozilla.org XIOC detected Domain: signingca1.addons.mozilla.org
extracted_from_files
detected Domain: mozilla.com XIOC detected Domain: mozilla.com
extracted_from_files
detected Domain: addons.mozilla.org XIOC detected Domain: addons.mozilla.org
extracted_from_files
detected Domain: content-signature.mozilla.org XIOC detected Domain: content-signature.mozilla.org
extracted_from_files
detected Domain: t29594a2d6febc2f494e47410343a446b.0db2db371d260c17859d7ad8f09cb0cf.addons.mozilla.org XIOC detected Domain: t29594a2d6febc2f494e47410343a446b.0db2db371d260c17859d7ad8f09cb0cf.addons.mozilla.org
extracted_from_files
detected URL: https://bing.com/ XIOC detected URL: https://bing.com/
extracted_from_files
Security Analysis Summary
Security Analysis Overview
Open in Brave Browser is a Firefox Add-ons extension published by Brian. Version 0.2.0 has been analyzed by the Risky Plugins security platform, receiving a risk score of 56.88/100 (MEDIUM risk) based on 85 security findings.
Risk Assessment
This extension presents moderate security risk. Several findings were detected that may warrant attention. Users should carefully review the permissions and findings before installation.
Findings Breakdown
- High: 22 finding(s)
- Medium: 63 finding(s)
What Was Analyzed
The security assessment covers multiple analysis categories:
- Malware Detection: YARA rule matching against 2,400+ malware signatures
- Secret Detection: Scanning for exposed API keys, tokens, and credentials
- Static Analysis: Code-level security analysis for common vulnerability patterns
- Network Analysis: Detection of suspicious network communications and endpoints
- Obfuscation Detection: Identification of code obfuscation techniques
Developer Information
Open in Brave Browser is published by Brian on the Firefox Add-ons marketplace. The extension has approximately 382 users.
Recommendation
Exercise caution with this extension. Review the detailed findings and ensure the requested permissions align with the extension's stated functionality before installation.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace