Is "Biu" on JetBrains Marketplace Safe to Install?

wu aven · jetbrains · v0.2.0

An IntelliJ IDEA plugin which makes PNG compression much more convenient. It's powered by the well known pngquant library and API from tinypng.

Risk Assessment

Analyzed
100
out of 100
CRITICAL

152 security findings detected across all analyzers

JetBrains plugin analyzed via plugin.xml configuration and static code analysis

Severity Breakdown

2
Critical
13
High
67
Medium
0
Low
0
Info

Finding Categories

11
Malware Signatures
2
Obfuscation
66
IoC Indicators

YARA Rules Matched

6 rules(11 hits)
postinstall network communication spyeye postinstall obfuscation postinstall file manipulation postinstall system command postinstall crypto operations

Plugin Configuration

JetBrains plugins declare dependencies and extension points in plugin.xml. Plugins can register actions, services, and listeners that run within the IDE process.

JETBRAINS-MANIFEST-APPLICATION-SERVICE-net.avenwu.tools.biu.config.DefaultPreference
JETBRAINS-MANIFEST-APPLICATION-COMPONENT-net.avenwu.tools.biu.LaunchApplication
JETBRAINS-MANIFEST-ACTION-OptionPNG
JETBRAINS-MANIFEST-ACTION-ToolPNGBatch

About This Extension

An IntelliJ IDEA plugin which makes PNG compression much more convenient. It's powered by the well known pngquant library and API from tinypng.

Detailed Findings

85 total

YARA Rule Matches

6 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
6
Domains
60
Strings
66

All Indicators · 66

Domain
detected Domain: launchapplication.java

XIOC detected Domain: launchapplication.java

extracted_from_files

Domain
detected Domain: jniloader.java

XIOC detected Domain: jniloader.java

extracted_from_files

Domain
detected Domain: gmail.com

XIOC detected Domain: gmail.com

extracted_from_files

Domain
detected Domain: tinypng.com

XIOC detected Domain: tinypng.com

extracted_from_files

Domain
detected Domain: pngquant.org

XIOC detected Domain: pngquant.org

extracted_from_files

Domain
detected Domain: settingconfiguration.java

XIOC detected Domain: settingconfiguration.java

extracted_from_files

Domain
detected Domain: note.gnu.build

XIOC detected Domain: note.gnu.build

extracted_from_files

Domain
detected Domain: res.java

XIOC detected Domain: res.java

extracted_from_files

Domain
detected Domain: png.java

XIOC detected Domain: png.java

extracted_from_files

Domain
detected Domain: plt.got

XIOC detected Domain: plt.got

extracted_from_files

Domain
detected Domain: d.pl

XIOC detected Domain: d.pl

extracted_from_files

Domain
detected Domain: onfilechosenlistener.java

XIOC detected Domain: onfilechosenlistener.java

extracted_from_files

Domain
detected Domain: avenwu.github.io

XIOC detected Domain: avenwu.github.io

extracted_from_files

URL
detected URL: https://avenwu.github.io/biu/

XIOC detected URL: https://avenwu.github.io/biu/

extracted_from_files

URL
detected URL: https://tinypng.com/developers

XIOC detected URL: https://tinypng.com/developers

extracted_from_files

URL
detected URL: http://blog.hacktons.cn/biu/

XIOC detected URL: http://blog.hacktons.cn/biu/

extracted_from_files

Domain
detected Domain: l.is

XIOC detected Domain: l.is

extracted_from_files

Domain
detected Domain: defaultpreference.java

XIOC detected Domain: defaultpreference.java

extracted_from_files

Domain
detected Domain: k.gg

XIOC detected Domain: k.gg

extracted_from_files

URL
detected URL: https://avenwu.github.io/biu

XIOC detected URL: https://avenwu.github.io/biu

extracted_from_files

URL
detected URL: https://pngquant.org/

XIOC detected URL: https://pngquant.org/

extracted_from_files

URL
detected URL: https://tinypng.com/

XIOC detected URL: https://tinypng.com/

extracted_from_files

Domain
detected Domain: q.mp

XIOC detected Domain: q.mp

extracted_from_files

Domain
detected Domain: k.us

XIOC detected Domain: k.us

extracted_from_files

Domain
detected Domain: 2z.at

XIOC detected Domain: 2z.at

extracted_from_files

Domain
detected Domain: 0.ng

XIOC detected Domain: 0.ng

extracted_from_files

Domain
detected Domain: q.bt

XIOC detected Domain: q.bt

extracted_from_files

Domain
detected Domain: x.tj

XIOC detected Domain: x.tj

extracted_from_files

Domain
detected Domain: j.si

XIOC detected Domain: j.si

extracted_from_files

Domain
detected Domain: liqobject.java

XIOC detected Domain: liqobject.java

extracted_from_files

Domain
detected Domain: pngquant.java

XIOC detected Domain: pngquant.java

extracted_from_files

Domain
detected Domain: pngquantexception.java

XIOC detected Domain: pngquantexception.java

extracted_from_files

Domain
detected Domain: result.java

XIOC detected Domain: result.java

extracted_from_files

Domain
detected Domain: s.lr

XIOC detected Domain: s.lr

extracted_from_files

Domain
detected Domain: g.bh

XIOC detected Domain: g.bh

extracted_from_files

Domain
detected Domain: o.mg

XIOC detected Domain: o.mg

extracted_from_files

Domain
detected Domain: keycellrenderer.java

XIOC detected Domain: keycellrenderer.java

extracted_from_files

Domain
detected Domain: quickcompressdialog.java

XIOC detected Domain: quickcompressdialog.java

extracted_from_files

Domain
detected Domain: quickpresenter.java

XIOC detected Domain: quickpresenter.java

extracted_from_files

Domain
detected Domain: settingconfigureview.java

XIOC detected Domain: settingconfigureview.java

extracted_from_files

Domain
detected Domain: blog.hacktons.cn

XIOC detected Domain: blog.hacktons.cn

extracted_from_files

Domain
detected Domain: tablepresenter.java

XIOC detected Domain: tablepresenter.java

extracted_from_files

Domain
detected Domain: image.java

XIOC detected Domain: image.java

extracted_from_files

Domain
detected Domain: batchcompressworker.java

XIOC detected Domain: batchcompressworker.java

extracted_from_files

Domain
detected Domain: singlecompressworker.java

XIOC detected Domain: singlecompressworker.java

extracted_from_files

Domain
detected Domain: tinyhelper.java

XIOC detected Domain: tinyhelper.java

extracted_from_files

Domain
detected Domain: basecellrenderer.java

XIOC detected Domain: basecellrenderer.java

extracted_from_files

Domain
detected Domain: batchcompresstabledialog.java

XIOC detected Domain: batchcompresstabledialog.java

extracted_from_files

Domain
detected Domain: bodycellrenderer.java

XIOC detected Domain: bodycellrenderer.java

extracted_from_files

Domain
detected Domain: imagetablemodel.java

XIOC detected Domain: imagetablemodel.java

extracted_from_files

Domain
detected Domain: g.fo

XIOC detected Domain: g.fo

extracted_from_files

Domain
detected Domain: icon.java

XIOC detected Domain: icon.java

extracted_from_files

Domain
detected Domain: autoimageminify.java

XIOC detected Domain: autoimageminify.java

extracted_from_files

Domain
detected Domain: imageminify.java

XIOC detected Domain: imageminify.java

extracted_from_files

Domain
detected Domain: imageminifyfactory.java

XIOC detected Domain: imageminifyfactory.java

extracted_from_files

Domain
detected Domain: pngquantimageminify.java

XIOC detected Domain: pngquantimageminify.java

extracted_from_files

Domain
detected Domain: tinyimageminify.java

XIOC detected Domain: tinyimageminify.java

extracted_from_files

Domain
detected Domain: uikit.java

XIOC detected Domain: uikit.java

extracted_from_files

Domain
detected Domain: utils.java

XIOC detected Domain: utils.java

extracted_from_files

Domain
detected Domain: optionpngmenuaction.java

XIOC detected Domain: optionpngmenuaction.java

extracted_from_files

Domain
detected Domain: toolpngaction.java

XIOC detected Domain: toolpngaction.java

extracted_from_files

Domain
detected Domain: toolpngbatchaction.java

XIOC detected Domain: toolpngbatchaction.java

extracted_from_files

Domain
detected Domain: fileitem.java

XIOC detected Domain: fileitem.java

extracted_from_files

Domain
detected Domain: keyitem.java

XIOC detected Domain: keyitem.java

extracted_from_files

Domain
detected Domain: refptr.free

XIOC detected Domain: refptr.free

extracted_from_files

Domain
detected Domain: libc.so

XIOC detected Domain: libc.so

extracted_from_files

Security Analysis Summary

Security Analysis Overview

Biu is a jetbrains extension published by wu aven. Version 0.2.0 has been analyzed by the Risky Plugins security platform, receiving a risk score of 100/100 (CRITICAL risk) based on 152 security findings.

Risk Assessment

This extension presents critical security risk. Severe issues were detected, potentially including malware indicators, exposed secrets, or dangerous behaviors. Installation is strongly discouraged until these issues are addressed.

Findings Breakdown

  • Critical: 2 finding(s)
  • High: 13 finding(s)
  • Medium: 67 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

Biu is published by wu aven on the jetbrains marketplace. The extension has approximately 8K users.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions