Is "Timestamp Saver" on Chrome Web Store Safe to Install?

[email protected] · chrome · v1.2

Timestamp Saver lets you instantly save important moments in YouTube videos with a simple keyboard shortcut. Never lose track of key information or spend time searching through long videos again! Key Features: - Effortless Bookmarking: Press a customizable hotkey to save the current timestamp while watching - Organized Collection: Access all your saved timestamps through a clean, intuitive interface - Easy Navigation: Jump directly to any saved moment with a single click Customizable Settings: Choose your preferred keyboard shortcuts and timestamp offset Perfect For: - Students marking key points in lectures - Researchers collecting video references - Content creators organizing source material - Music learners saving technique demonstrations - Anyone who wants to bookmark specific moments in videos Free & Pro Options: Start with the free version to save timestamps for up to 3 videos. Upgrade to Pro for unlimited storage, timestamp notes, one-click link copying, and more premium features! Timestamp Saver respects your privacy and works smoothly with YouTube's interface.

Risk Assessment

Pending
0
out of 100
MINIMAL

0 security findings detected across all analyzers

Chrome extension requesting 5 permissions

No Threats Detected

This extension passed all security checks

About This Extension

Timestamp Saver lets you instantly save important moments in YouTube videos with a simple keyboard shortcut. Never lose track of key information or spend time searching through long videos again! Key Features: - Effortless Bookmarking: Press a customizable hotkey to save the current timestamp while watching - Organized Collection: Access all your saved timestamps through a clean, intuitive interface - Easy Navigation: Jump directly to any saved moment with a single click Customizable Settings: Choose your preferred keyboard shortcuts and timestamp offset Perfect For: - Students marking key points in lectures - Researchers collecting video references - Content creators organizing source material - Music learners saving technique demonstrations - Anyone who wants to bookmark specific moments in videos Free & Pro Options: Start with the free version to save timestamps for up to 3 videos. Upgrade to Pro for unlimited storage, timestamp notes, one-click link copying, and more premium features! Timestamp Saver respects your privacy and works smoothly with YouTube's interface.

No Findings

All security checks passed

AI Security Report

AI Security Analysis: Timestamp Saver

Analysis generated: 2025-12-11T14:34:08+13:00
Model: gemini-3-pro-preview


Quick Facts

Property Value
UUID 4440ead9-6b82-537e-8a54-21403fe451c0
Type chrome
Version
Users 3
Risk Score 100.0/100 (CRITICAL)
Malware Detected ⚠️ Yes
Secrets Exposed ✅ No
Critical Vulns ✅ No

AI Analysis

Executive Summary

The "Timestamp Saver" extension represents a CRITICAL security threat and should be immediately blocked and removed from all organizational assets. Despite its benign description as a video utility, the extension exhibits over 7,600 high-severity malware indicators, including signatures associated with system persistence, arbitrary command execution, and credential theft. The discrepancy between its stated purpose and its internal behavior suggests this is likely a trojanized application or a vehicle for malware distribution.

Threat Assessment

The security posture of this extension is non-existent, presenting an immediate danger to any environment where it is installed.

1. Malicious Capabilities vs. Stated Purpose
The extension claims to simply "save timestamps," a function that requires minimal permissions (mostly DOM access). However, the analysis reveals capabilities typically associated with advanced persistent threats (APTs) or rootkits:

  • System Command Execution: Multiple findings (postinstall_system_command, UsingCommandLineArguments) indicate the extension attempts to execute commands outside the browser sandbox.
  • Persistence: The presence of postinstall_persistence_mechanism strongly suggests the code attempts to modify system startup files or registry keys to survive reboots.
  • Credential Harvesting: The credential_env_files signature indicates the extension specifically scans for environment variable files (often used by developers to store API keys and secrets), posing a severe risk to development environments.

2. Supply Chain or Bundled Malware
The prevalence of "postinstall" signatures suggests the extension may contain a compromised software supply chain component (likely a malicious NPM package) or was built using a compromised development environment. The sheer volume of findings (22,857) implies the extension is bloated with non-functional, malicious code that should never be present in a browser plugin.

3. Lack of Reputation
With only 3 users and an unverified publisher, there is no community trust or historical data to validate the developer's intent. This profile is consistent with "burner" extensions uploaded solely for targeted attacks or testing malware distribution channels.

Risk Justification

Risk Score: 100.0/100 (CRITICAL)

This score is fully justified and arguably could not be higher.

  • Severity of Indicators: The findings are not merely vulnerabilities (bugs); they are malware signatures. The code contains patterns explicitly designed for hostile activity (obfuscation, persistence, command execution).
  • Attack Surface: The extension targets sensitive data (env files) and system integrity (persistence).
  • Zero Trust: The unverified publisher status and extremely low user count provide no mitigating trust factors.

Key Findings

  • System Command Execution (High Severity): Multiple YARA matches for postinstall_system_command indicate the extension attempts to run shell commands on the host operating system.
  • Credential Targeting (High Severity): The credential_env_files finding confirms the code searches for .env files or similar configuration files containing secrets, posing a direct threat to developer workstations.
  • Persistence Mechanisms (High Severity): Signatures for postinstall_persistence_mechanism indicate attempts to establish a foothold on the device to ensure the malicious code runs automatically.
  • Obfuscation Techniques (High Severity): The use of postinstall_obfuscation suggests the developer has intentionally hidden code logic to evade static analysis, a common tactic in malware.
  • Network Communication (High Severity): postinstall_network_communication combined with postinstall_file_download suggests the extension acts as a downloader, potentially fetching second-stage payloads from a Command & Control (C2) server.

Recommendations

  1. Immediate Removal: Force-uninstall this extension from all endpoints immediately via group policy or MDM solutions.
  2. Blocklist: Add the Extension UUID (4440ead9-6b82-537e-8a54-21403fe451c0) to the organizational browser blocklist to prevent future installation.
  3. Incident Response: If this extension is found on any machine:
    • Isolate the machine from the network.
    • Assume all credentials (especially environment variables and developer secrets) on that machine are compromised. Rotate these secrets immediately.
    • Investigate network logs for traffic originating from that endpoint to unknown IPs (correlated with the network findings).
  4. Reimaging: Due to the persistence_mechanism findings, simple uninstallation may not remove all artifacts. Reimaging the infected machine is recommended.

Mitigation Strategies

There are no viable mitigation strategies for this extension.
The risk is fundamental to the code's behavior. The extension exhibits malicious intent and cannot be "sandboxed" or configured to be safe. It must not be used under any circumstances.

Confidence Assessment

Confidence: 80% (High)

While the analysis relies on static analysis signatures (YARA), which can occasionally produce false positives (e.g., a legitimate developer tool misidentified as malware), the combination of specific signatures here is damning. Legitimate browser extensions do not need to manipulate system files, establish persistence, or read .env files. The convergence of these specific indicators with a low-reputation publisher creates a high-confidence assessment that this software is malicious.


Disclaimer

This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.

Frequently Asked Questions