Is "QuickSummarize" on Chrome Web Store Safe to Install?
QuickSummarize is a Chrome Side Panel reading assistant that helps you understand webpages faster. It lets you summarize the current page, focus on selected text, and ask questions about the content you are reading without leaving the page. Why install it: - Save time when reading long articles, blog posts, and documentation - Get quick summaries of the current page - Ask follow-up questions about the current page context - Focus on selected text when you only care about part of the page - Use your own AI provider, API base URL, model, and API key - Keep control of your data without relying on a plugin-owned backend Privacy and control: - QuickSummarize does not require a built-in cloud account - You connect your own AI API provider - Your API key is stored locally in your browser - The extension does not route your requests through a QuickSummarize server - The extension does not sell or collect personal data for advertising Typical use cases: - Summarize news articles - Understand long technical documentation - Review blog posts faster - Ask questions about the page you are currently reading - Extract the key points from selected text
Risk Assessment
Analyzed157 security findings detected across all analyzers
Chrome extension requesting 7 permissions
Severity Breakdown
Finding Categories
YARA Rules Matched
8 rules(57 hits)Requested Permissions
7 permissionsAbout This Extension
Detailed Findings
71 totalYARA Rule Matches
8 rulesIndicators of Compromise
Network indicators, suspicious strings, and potential IoCs extracted during analysis
All Indicators · 84
detected Domain: tools.read XIOC detected Domain: tools.read
extracted_from_files
detected Domain: lines.map XIOC detected Domain: lines.map
extracted_from_files
detected Domain: tab.id XIOC detected Domain: tab.id
extracted_from_files
detected URL: https://api.openai.com/v1 XIOC detected URL: https://api.openai.com/v1
extracted_from_files
detected URL: https://chrome.google.com/webstore/ XIOC detected URL: https://chrome.google.com/webstore/
extracted_from_files
detected URL: https://chromewebstore.google.com/') XIOC detected URL: https://chromewebstore.google.com/')
extracted_from_files
detected URL: https://chrome.google.com/webstore/') XIOC detected URL: https://chrome.google.com/webstore/')
extracted_from_files
detected URL: https://clients2.google.com/service/update2/crx XIOC detected URL: https://clients2.google.com/service/update2/crx
extracted_from_files
detected URL: https://www.youtube.com/* XIOC detected URL: https://www.youtube.com/*
extracted_from_files
detected Domain: xhr.prototype.open XIOC detected Domain: xhr.prototype.open
extracted_from_files
detected Domain: originalopen.call XIOC detected Domain: originalopen.call
extracted_from_files
detected Domain: hero-metric-value.is XIOC detected Domain: hero-metric-value.is
extracted_from_files
detected Domain: workspace-tab.is XIOC detected Domain: workspace-tab.is
extracted_from_files
detected Domain: workspace-panel.is XIOC detected Domain: workspace-panel.is
extracted_from_files
detected URL: https://github.com/markedjs/marked. XIOC detected URL: https://github.com/markedjs/marked.
extracted_from_files
detected URL: https://chromewebstore.google.com/ XIOC detected URL: https://chromewebstore.google.com/
extracted_from_files
detected Domain: inputitems.map XIOC detected Domain: inputitems.map
extracted_from_files
detected Domain: mergedsegments.map XIOC detected Domain: mergedsegments.map
extracted_from_files
detected Domain: www.youtube.com XIOC detected Domain: www.youtube.com
extracted_from_files
detected Domain: script.id XIOC detected Domain: script.id
extracted_from_files
detected Domain: currentbutton.click XIOC detected Domain: currentbutton.click
extracted_from_files
detected Domain: subtitlebutton.click XIOC detected Domain: subtitlebutton.click
extracted_from_files
detected Domain: window.location.search XIOC detected Domain: window.location.search
extracted_from_files
detected Domain: link.download XIOC detected Domain: link.download
extracted_from_files
detected Domain: link.click XIOC detected Domain: link.click
extracted_from_files
detected Domain: response.data XIOC detected Domain: response.data
extracted_from_files
detected Domain: err.name XIOC detected Domain: err.name
extracted_from_files
detected Domain: event.target XIOC detected Domain: event.target
extracted_from_files
detected Domain: activetab.id XIOC detected Domain: activetab.id
extracted_from_files
detected Domain: t2.link XIOC detected Domain: t2.link
extracted_from_files
detected Domain: t2.br XIOC detected Domain: t2.br
extracted_from_files
detected Domain: t2.call XIOC detected Domain: t2.call
extracted_from_files
detected Domain: i.name XIOC detected Domain: i.name
extracted_from_files
detected Domain: o.call XIOC detected Domain: o.call
extracted_from_files
detected Domain: i.call XIOC detected Domain: i.call
extracted_from_files
detected Domain: object.prototype.tostring.call XIOC detected Domain: object.prototype.tostring.call
extracted_from_files
detected Domain: this.state.top XIOC detected Domain: this.state.top
extracted_from_files
detected Domain: p.call XIOC detected Domain: p.call
extracted_from_files
detected Domain: this.tokenizer.link XIOC detected Domain: this.tokenizer.link
extracted_from_files
detected Domain: this.tokenizer.br XIOC detected Domain: this.tokenizer.br
extracted_from_files
detected Domain: h.call XIOC detected Domain: h.call
extracted_from_files
detected Domain: this.renderer.space XIOC detected Domain: this.renderer.space
extracted_from_files
detected Domain: this.renderer.hr XIOC detected Domain: this.renderer.hr
extracted_from_files
detected Domain: i.items.at XIOC detected Domain: i.items.at
extracted_from_files
detected Domain: s.call XIOC detected Domain: s.call
extracted_from_files
detected Domain: this.tokenizer.space XIOC detected Domain: this.tokenizer.space
extracted_from_files
detected Domain: t2.at XIOC detected Domain: t2.at
extracted_from_files
detected Domain: this.inlinequeue.at XIOC detected Domain: this.inlinequeue.at
extracted_from_files
detected Domain: this.tokenizer.hr XIOC detected Domain: this.tokenizer.hr
extracted_from_files
detected Domain: l.call XIOC detected Domain: l.call
extracted_from_files
detected Domain: observations.map XIOC detected Domain: observations.map
extracted_from_files
detected Domain: selected.chunks.map XIOC detected Domain: selected.chunks.map
extracted_from_files
detected Domain: n.at XIOC detected Domain: n.at
extracted_from_files
detected Domain: this.lexer.state.top XIOC detected Domain: this.lexer.state.top
extracted_from_files
detected Domain: s.at XIOC detected Domain: s.at
extracted_from_files
detected Domain: d.search XIOC detected Domain: d.search
extracted_from_files
detected Domain: a.search XIOC detected Domain: a.search
extracted_from_files
detected Domain: currentsegments.map XIOC detected Domain: currentsegments.map
extracted_from_files
detected Domain: selected.map XIOC detected Domain: selected.map
extracted_from_files
detected Domain: transcriptchunks.map XIOC detected Domain: transcriptchunks.map
extracted_from_files
detected Domain: pagechunks.map XIOC detected Domain: pagechunks.map
extracted_from_files
detected Domain: tools.search XIOC detected Domain: tools.search
extracted_from_files
detected Domain: track.id XIOC detected Domain: track.id
extracted_from_files
detected Domain: chunk.id XIOC detected Domain: chunk.id
extracted_from_files
detected Domain: error.name XIOC detected Domain: error.name
extracted_from_files
detected Domain: normalized.map XIOC detected Domain: normalized.map
extracted_from_files
detected Domain: date.now XIOC detected Domain: date.now
extracted_from_files
detected Domain: list.map XIOC detected Domain: list.map
extracted_from_files
detected Domain: items.map XIOC detected Domain: items.map
extracted_from_files
detected Domain: chunks.map XIOC detected Domain: chunks.map
extracted_from_files
detected Domain: compacted.map XIOC detected Domain: compacted.map
extracted_from_files
detected Domain: chrome.storage XIOC detected Domain: chrome.storage
extracted_from_files
detected Domain: sidepanelapi.open XIOC detected Domain: sidepanelapi.open
extracted_from_files
detected Domain: segments.map XIOC detected Domain: segments.map
extracted_from_files
detected Domain: data.events XIOC detected Domain: data.events
extracted_from_files
detected Domain: event.segs.map XIOC detected Domain: event.segs.map
extracted_from_files
detected Domain: chromewebstore.google.com XIOC detected Domain: chromewebstore.google.com
extracted_from_files
detected Domain: state.pending.search XIOC detected Domain: state.pending.search
extracted_from_files
detected Domain: message.data XIOC detected Domain: message.data
extracted_from_files
detected Domain: port.name XIOC detected Domain: port.name
extracted_from_files
detected Domain: reader.read XIOC detected Domain: reader.read
extracted_from_files
detected Domain: event.data XIOC detected Domain: event.data
extracted_from_files
detected Domain: root.id XIOC detected Domain: root.id
extracted_from_files
detected Domain: api.openai.com XIOC detected Domain: api.openai.com
extracted_from_files
Security Analysis Summary
Security Analysis Overview
QuickSummarize is a Chrome Web Store extension published by [email protected]. Version 0.1.3 has been analyzed by the Risky Plugins security platform, receiving a risk score of 84.92/100 (HIGH risk) based on 157 security findings.
Risk Assessment
This extension presents critical security risk. Severe issues were detected, potentially including malware indicators, exposed secrets, or dangerous behaviors. Installation is strongly discouraged until these issues are addressed.
Findings Breakdown
- Medium: 100 finding(s)
- Low: 57 finding(s)
What Was Analyzed
The security assessment covers multiple analysis categories:
- Malware Detection: YARA rule matching against 2,400+ malware signatures
- Secret Detection: Scanning for exposed API keys, tokens, and credentials
- Static Analysis: Code-level security analysis for common vulnerability patterns
- Network Analysis: Detection of suspicious network communications and endpoints
- Obfuscation Detection: Identification of code obfuscation techniques
Developer Information
QuickSummarize is published by [email protected] on the Chrome Web Store marketplace.
Recommendation
This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace
KPN Password Manager
[email protected]
MAGgie - An AI Assistant
[email protected]
Aintivirus Privacy and Wallet
[email protected]
BugZap — Visual Bug Reporter
[email protected]
FormGenieAI
[email protected]
OmniChat
[email protected]