Is "Draft by Slite" on Chrome Web Store Safe to Install?
Draft by Slite turns your new tabs into a distraction-free editor for your quick notes and ideas—no need to be a Slite user. Notes are automatically saved, even if you close your tab. When you’re done, send them to your Slite workspace in one click. It allows you to: • save your spur of the moment ideas the second they come to you • start writing meeting minutes in seconds • keep a quick access to your daily to-do list About Slite Slite is the fastest way to access trusted company information. Powered by AI, Slite’s knowledge base enables growing teams to instantly get the answers they need - without even searching. From onboarding guides to all hands notes, Slite keeps all types of company information centralized in one place. Docs stay organized, can be verified, and are tracked so everyone can get on with their work, informed. Replace all-in-one workspaces with a tool built for company knowledge and see it scale with your team. Join more than 200,000 companies that use Slite as their single source of truth today.
Risk Assessment
Analyzed7472 security findings detected across all analyzers
Chrome extension requesting 5 permissions
Severity Breakdown
Finding Categories
YARA Rules Matched
16 rules(997 hits)Requested Permissions
5 permissionsIntercept, modify, and block all network requests
About This Extension
Detailed Findings
1000 totalYARA Rule Matches
16 rulesAI Security Report
AI Security Analysis: Draft by Slite
Analysis generated: 2025-12-12T17:47:27+13:00
Model: gemini-3-pro-preview
Quick Facts
| Property | Value |
|---|---|
| UUID | 41580bcd-6c36-5de6-9ab8-af09bf5a3734 |
| Type | chrome |
| Version | |
| Users | 3000 |
| Risk Score | 100.0/100 (CRITICAL) |
| Malware Detected | ⚠️ Yes |
| Secrets Exposed | ✅ No |
| Critical Vulns | ✅ No |
AI Analysis
Executive Summary
Do not install or use this extension. The "Draft by Slite" extension presents a CRITICAL security risk (Risk Score: 100/100). The analysis detected over 1,000 high-severity indicators consistent with malware behavior, specifically scripts attempting to execute system commands, manipulate files, and establish persistence. The sheer volume of these findings suggests the extension is either actively malicious or has been severely compromised via a supply chain attack (e.g., bundling compromised dependencies). Immediate removal is required.
Threat Assessment
The security posture of this extension is non-existent; it exhibits behavior characteristic of a Trojan or a compromised software package.
- Malware-Like Behavior: The analysis identified over 1,000 instances of "postinstall" scripts. In the context of a browser extension, this is highly abnormal. These scripts appear designed to execute system commands, download files, and modify the file system—actions that break the standard browser extension sandbox model.
- Potential Supply Chain Compromise: The specific YARA tags (
postinstall_file_manipulation,credential_env_files) strongly suggest the developer may have accidentally or negligently bundled the entirenode_modulesdevelopment environment (including malicious or vulnerable dependencies) into the final extension package. - Persistence and Obfuscation: Findings indicate attempts to establish persistence mechanisms (Finding 18) and use obfuscation (Finding 16), which are hallmarks of malware trying to hide its activity and survive system restarts.
- Unverified Publisher: The publisher is not verified, meaning their identity has not been confirmed by the browser store, significantly increasing the likelihood that this is a malicious actor or an abandoned project.
Risk Justification
The 100/100 (CRITICAL) risk score is fully justified and potentially conservative given the findings:
- Severity of Findings: The presence of
postinstall_system_commandandpostinstall_persistence_mechanismindicates code that attempts to escape the browser context and impact the underlying operating system. - Volume of Findings: 7,472 total findings is an order of magnitude higher than typical legitimate extensions, indicating a massive amount of uncontrolled or malicious code.
- Trust Deficit: A Trust Score of 0/100 combined with an unverified publisher status confirms there is no historical reputation to mitigate these technical findings.
Key Findings
- System Command Execution (Findings 4, 7, 11, 17, 21, 26, 30): Multiple instances of code attempting to run shell or system commands. This is a critical violation of browser extension security principles.
- Persistence Mechanisms (Finding 18): Code identified that attempts to ensure the software remains active across restarts, a common malware tactic.
- File System Manipulation (Findings 1, 5, 9, 14, 24, 27, 28): The extension contains scripts designed to read, write, or delete files outside of standard local storage.
- Obfuscated Code (Findings 16, 23): The presence of obfuscation suggests an intent to hide logic from security scanners and manual review.
- Credential Exposure Risk (Finding 22): The
credential_env_filesmatch suggests the extension may contain or be scanning for environment files (.env) which often hold API keys and secrets.
Recommendations
- IMMEDIATE BLOCK: Add the Extension UUID (
41580bcd-6c36-5de6-9ab8-af09bf5a3734) to the organization's browser blocklist immediately. - REMOVAL: Force-uninstall the extension from all endpoints where it is currently present.
- INCIDENT RESPONSE: For the 3,000 users who may have installed this:
- Scan their endpoints for secondary malware payloads.
- Reset credentials for any services accessed while the extension was active, specifically Slite credentials.
- NETWORK BLOCKING: If specific domains were identified in the 6,420 IOCs (not listed in detail here), block outbound traffic to those indicators at the firewall level.
Mitigation Strategies
There are no viable mitigation strategies for this extension.
Due to the presence of code attempting system-level command execution and persistence, the risk cannot be mitigated by restricting permissions or network access. The extension is fundamentally unsafe. Users should switch to the official Slite web application or desktop client instead.
Confidence Assessment
Confidence: 80%
I am highly confident this extension represents a critical risk.
- Caveat: There is a slight possibility that the developer simply bundled their entire development environment (including
node_modulesand test scripts) into the production build without malicious intent. However, even in this "best case" scenario, the extension introduces a massive attack surface and executes arbitrary scripts, making it functionally indistinguishable from malware in terms of risk profile. The recommendation to block remains unchanged regardless of intent.
Disclaimer
This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace
Super.work - AI search on all your team data
[email protected]
Ask by Slite
[email protected]
Research Notes
[email protected]
RoTrade - Roblox Trading Automated
[email protected]
PubMed Citation Bar
[email protected]
Cover-Letter-AI
[email protected]