Is "JSaw Puzzle" on Chrome Web Store Safe to Install?

[email protected] · chrome · v1.11

A browser extension to create and solve jigsaw puzzles. The extension can fetch random pictures from different feeds. Currently it can fetch from Wikimedia Commons and Public Domain Pictures. For more details, see README at: https://github.com/gorhill/jsawpuzzle#jsaw-puzzle

Risk Assessment

Analyzed
56.23
out of 100
MEDIUM

189 security findings detected across all analyzers

Chrome extension requesting 4 permissions

Severity Breakdown

0
Critical
36
High
153
Medium
0
Low
0
Info

Finding Categories

36
Malware Signatures
4
Network
147
IoC Indicators

YARA Rules Matched

8 rules(36 hits)
postinstall crypto operations postinstall system command LocalStorageShouldNotBeUsed postinstall file manipulation postinstall network communication postinstall file download postinstall obfuscation NoUseWeakRandom

Requested Permissions

4 permissions
contextMenus
Low
storage
Low
https://commons.wikimedia.org/*
Low
https://*.publicdomainpictures.net/*
Low

About This Extension

A browser extension to create and solve jigsaw puzzles. The extension can fetch random pictures from different feeds. Currently it can fetch from Wikimedia Commons and Public Domain Pictures. For more details, see README at: https://github.com/gorhill/jsawpuzzle#jsaw-puzzle

Detailed Findings

40 total

YARA Rule Matches

8 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
33
IP Addresses
13
Domains
109
Strings
147

All Indicators · 147

URL
detected URL: https://commons.wikimedia.org/wiki/Commons:Featured_pictures/chronological/$

XIOC detected URL: https://commons.wikimedia.org/wiki/Commons:Featured_pictures/chronological/$

extracted_from_files

IP
detected IP: ::af

XIOC detected IP: ::af

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

URL
detected URL: https://github.com/gorhill/Javascript-Voronoi/LICENSE.md

XIOC detected URL: https://github.com/gorhill/Javascript-Voronoi/LICENSE.md

extracted_from_files

URL
detected URL: https://clients2.google.com/service/update2/crx

XIOC detected URL: https://clients2.google.com/service/update2/crx

extracted_from_files

URL
detected URL: https://commons.wikimedia.org/*

XIOC detected URL: https://commons.wikimedia.org/*

extracted_from_files

URL
detected URL: https://*.publicdomainpictures.net/*

XIOC detected URL: https://*.publicdomainpictures.net/*

extracted_from_files

URL
detected URL: https://github.com/gorhill/uBlock

XIOC detected URL: https://github.com/gorhill/uBlock

extracted_from_files

URL
detected URL: https://developer.mozilla.org/en-US/docs/Web/API/Web_Workers_API/Structured_clone_algorithm#supported_types

XIOC detected URL: https://developer.mozilla.org/en-US/docs/Web/API/Web_Workers_API/Structured_clone_algorithm#supported_types

extracted_from_files

URL
detected URL: https://github.com/gorhill/lz4-wasm/blob/8995cdef7b/dist/lz4-block-codec-js.js

XIOC detected URL: https://github.com/gorhill/lz4-wasm/blob/8995cdef7b/dist/lz4-block-codec-js.js

extracted_from_files

URL
detected URL: https://github.com/gorhill/Javascript-Voronoi

XIOC detected URL: https://github.com/gorhill/Javascript-Voronoi

extracted_from_files

URL
detected URL: http://www.freesound.org/samplesViewSingle.php?id=35104

XIOC detected URL: http://www.freesound.org/samplesViewSingle.php?id=35104

extracted_from_files

URL
detected URL: http://www.freesound.org/samplesViewSingle.php?id=60789

XIOC detected URL: http://www.freesound.org/samplesViewSingle.php?id=60789

extracted_from_files

URL
detected URL: http://www.freesound.org/usersViewSingle.php?id=199526

XIOC detected URL: http://www.freesound.org/usersViewSingle.php?id=199526

extracted_from_files

URL
detected URL: https://paulbourke.net/geometry/polygonmesh/

XIOC detected URL: https://paulbourke.net/geometry/polygonmesh/

extracted_from_files

URL
detected URL: https://paulbourke.net/

XIOC detected URL: https://paulbourke.net/

extracted_from_files

URL
detected URL: https://alienryderflex.com/hsp.html

XIOC detected URL: https://alienryderflex.com/hsp.html

extracted_from_files

URL
detected URL: https://www.wikidata.org/wiki/Q34788025

XIOC detected URL: https://www.wikidata.org/wiki/Q34788025

extracted_from_files

URL
detected URL: http://www.freesound.org/

XIOC detected URL: http://www.freesound.org/

extracted_from_files

URL
detected URL: http://www.freesound.org/samplesViewSingle.php?id=12842

XIOC detected URL: http://www.freesound.org/samplesViewSingle.php?id=12842

extracted_from_files

URL
detected URL: http://www.freesound.org/usersViewSingle.php?id=4942

XIOC detected URL: http://www.freesound.org/usersViewSingle.php?id=4942

extracted_from_files

URL
detected URL: http://www.freesound.org/samplesViewSingle.php?id=12843

XIOC detected URL: http://www.freesound.org/samplesViewSingle.php?id=12843

extracted_from_files

URL
detected URL: http://www.freesound.org/samplesViewSingle.php?id=35102

XIOC detected URL: http://www.freesound.org/samplesViewSingle.php?id=35102

extracted_from_files

URL
detected URL: http://www.freesound.org/usersViewSingle.php?id=140756

XIOC detected URL: http://www.freesound.org/usersViewSingle.php?id=140756

extracted_from_files

URL
detected URL: https://commons.wikimedia.org/wiki/File:Cape_Town_(ZA),_Wale_Street_--_2024_--_3544.jpg',

XIOC detected URL: https://commons.wikimedia.org/wiki/File:Cape_Town_(ZA),_Wale_Street_--_2024_--_3544.jpg',

extracted_from_files

URL
detected URL: https://upload.wikimedia.org/wikipedia/commons/thumb/b/b2/Cape_Town_%28ZA%29%2C_Wale_Street_--_2024_--_3544.jpg/300px-Cape_Town_%28ZA%29%2C_Wale_Street_--_2024_--_3544.jpg',

XIOC detected URL: https://upload.wikimedia.org/wikipedia/commons/thumb/b/b2/Cape_Town_%28ZA%29%2C_Wale_Street_--_2024_--_3544.jpg/300px-Cape_Town_%28ZA%29%2C_Wale_Street_--_2024_--_3544.jpg',

extracted_from_files

URL
detected URL: https://upload.wikimedia.org/wikipedia/commons/thumb/b/b2/Cape_Town_%28ZA%29%2C_Wale_Street_--_2024_--_3544.jpg/1600px-Cape_Town_%28ZA%29%2C_Wale_Street_--_2024_--_3544.jpg',

XIOC detected URL: https://upload.wikimedia.org/wikipedia/commons/thumb/b/b2/Cape_Town_%28ZA%29%2C_Wale_Street_--_2024_--_3544.jpg/1600px-Cape_Town_%28ZA%29%2C_Wale_Street_--_2024_--_3544.jpg',

extracted_from_files

URL
detected URL: http://adomas.org/javascript-mouse-wheel/

XIOC detected URL: http://adomas.org/javascript-mouse-wheel/

extracted_from_files

URL
detected URL: https://github.com/gorhill/jsawpuzzle

XIOC detected URL: https://github.com/gorhill/jsawpuzzle

extracted_from_files

URL
detected URL: https://www.gnu.org/licenses/

XIOC detected URL: https://www.gnu.org/licenses/

extracted_from_files

URL
detected URL: https://commons.wikimedia.org/wiki/File:Cape_Town_(ZA),_Wale_Street_--_2024_--_3544.jpg

XIOC detected URL: https://commons.wikimedia.org/wiki/File:Cape_Town_(ZA),_Wale_Street_--_2024_--_3544.jpg

extracted_from_files

Domain
detected Domain: l-i.yt

XIOC detected Domain: l-i.yt

extracted_from_files

Domain
detected Domain: p.yt

XIOC detected Domain: p.yt

extracted_from_files

URL
detected URL: http://www.gnu.org/licenses/

XIOC detected URL: http://www.gnu.org/licenses/

extracted_from_files

URL
detected URL: https://www.publicdomainpictures.net/view-image.php?image=$

XIOC detected URL: https://www.publicdomainpictures.net/view-image.php?image=$

extracted_from_files

Domain
detected Domain: a.tl

XIOC detected Domain: a.tl

extracted_from_files

URL
detected URL: https://commons.wikimedia.org/wiki/Template:Potd/$

XIOC detected URL: https://commons.wikimedia.org/wiki/Template:Potd/$

extracted_from_files

Domain
detected Domain: p.site

XIOC detected Domain: p.site

extracted_from_files

Domain
detected Domain: r.site

XIOC detected Domain: r.site

extracted_from_files

Domain
detected Domain: i.site

XIOC detected Domain: i.site

extracted_from_files

Domain
detected Domain: o.site

XIOC detected Domain: o.site

extracted_from_files

Domain
detected Domain: q.site

XIOC detected Domain: q.site

extracted_from_files

Domain
detected Domain: l.va

XIOC detected Domain: l.va

extracted_from_files

Domain
detected Domain: a.yt

XIOC detected Domain: a.yt

extracted_from_files

Domain
detected Domain: this.edge.va

XIOC detected Domain: this.edge.va

extracted_from_files

Domain
detected Domain: b.va

XIOC detected Domain: b.va

extracted_from_files

Domain
detected Domain: b.site

XIOC detected Domain: b.site

extracted_from_files

Domain
detected Domain: e.site

XIOC detected Domain: e.site

extracted_from_files

Domain
detected Domain: n.site

XIOC detected Domain: n.site

extracted_from_files

Domain
detected Domain: m.site

XIOC detected Domain: m.site

extracted_from_files

Domain
detected Domain: c.site

XIOC detected Domain: c.site

extracted_from_files

Domain
detected Domain: msg.data

XIOC detected Domain: msg.data

extracted_from_files

Domain
detected Domain: msg.id

XIOC detected Domain: msg.id

extracted_from_files

Domain
detected Domain: license.md

XIOC detected Domain: license.md

extracted_from_files

Domain
detected Domain: this.site

XIOC detected Domain: this.site

extracted_from_files

Domain
detected Domain: c.va

XIOC detected Domain: c.va

extracted_from_files

Domain
detected Domain: this.va

XIOC detected Domain: this.va

extracted_from_files

Domain
detected Domain: d.va

XIOC detected Domain: d.va

extracted_from_files

Domain
detected Domain: job.data

XIOC detected Domain: job.data

extracted_from_files

Domain
detected Domain: ev.data

XIOC detected Domain: ev.data

extracted_from_files

Domain
detected Domain: console.info

XIOC detected Domain: console.info

extracted_from_files

Domain
detected Domain: job.id

XIOC detected Domain: job.id

extracted_from_files

Domain
detected Domain: a.name

XIOC detected Domain: a.name

extracted_from_files

Domain
detected Domain: b.name

XIOC detected Domain: b.name

extracted_from_files

Domain
detected Domain: thread.name

XIOC detected Domain: thread.name

extracted_from_files

Domain
detected Domain: developer.mozilla.org

XIOC detected Domain: developer.mozilla.org

extracted_from_files

Domain
detected Domain: browser.storage

XIOC detected Domain: browser.storage

extracted_from_files

Domain
detected Domain: object.prototype.tostring.call

XIOC detected Domain: object.prototype.tostring.call

extracted_from_files

Domain
detected Domain: object.prototype.hasownproperty.call

XIOC detected Domain: object.prototype.hasownproperty.call

extracted_from_files

Domain
detected Domain: lz4.data

XIOC detected Domain: lz4.data

extracted_from_files

Domain
detected Domain: this.name

XIOC detected Domain: this.name

extracted_from_files

Domain
detected Domain: this.jobs

XIOC detected Domain: this.jobs

extracted_from_files

Domain
detected Domain: sidebox.br

XIOC detected Domain: sidebox.br

extracted_from_files

Domain
detected Domain: bedbox.tl

XIOC detected Domain: bedbox.tl

extracted_from_files

Domain
detected Domain: partbox.br

XIOC detected Domain: partbox.br

extracted_from_files

Domain
detected Domain: bedbox.br

XIOC detected Domain: bedbox.br

extracted_from_files

Domain
detected Domain: this.drawingstack.map

XIOC detected Domain: this.drawingstack.map

extracted_from_files

Domain
detected Domain: clients2.google.com

XIOC detected Domain: clients2.google.com

extracted_from_files

Domain
detected Domain: options.id

XIOC detected Domain: options.id

extracted_from_files

Domain
detected Domain: shadowedbbox.br

XIOC detected Domain: shadowedbbox.br

extracted_from_files

Domain
detected Domain: tile.id

XIOC detected Domain: tile.id

extracted_from_files

Domain
detected Domain: region.bbox.tl

XIOC detected Domain: region.bbox.tl

extracted_from_files

Domain
detected Domain: part.id

XIOC detected Domain: part.id

extracted_from_files

Domain
detected Domain: target.id

XIOC detected Domain: target.id

extracted_from_files

Domain
detected Domain: sidebox.tl

XIOC detected Domain: sidebox.tl

extracted_from_files

Domain
detected Domain: data.sides.map

XIOC detected Domain: data.sides.map

extracted_from_files

Domain
detected Domain: a.sides.map

XIOC detected Domain: a.sides.map

extracted_from_files

Domain
detected Domain: a.map

XIOC detected Domain: a.map

extracted_from_files

Domain
detected Domain: other.id

XIOC detected Domain: other.id

extracted_from_files

Domain
detected Domain: thisside.id

XIOC detected Domain: thisside.id

extracted_from_files

Domain
detected Domain: otherside.id

XIOC detected Domain: otherside.id

extracted_from_files

Domain
detected Domain: piece.id

XIOC detected Domain: piece.id

extracted_from_files

Domain
detected Domain: a.id

XIOC detected Domain: a.id

extracted_from_files

Domain
detected Domain: this.bbox.tl

XIOC detected Domain: this.bbox.tl

extracted_from_files

Domain
detected Domain: this.bbox.br

XIOC detected Domain: this.bbox.br

extracted_from_files

Domain
detected Domain: side.id

XIOC detected Domain: side.id

extracted_from_files

Domain
detected Domain: data.id

XIOC detected Domain: data.id

extracted_from_files

Domain
detected Domain: ctx.save

XIOC detected Domain: ctx.save

extracted_from_files

Domain
detected Domain: this.sides.map

XIOC detected Domain: this.sides.map

extracted_from_files

Domain
detected Domain: bb.br

XIOC detected Domain: bb.br

extracted_from_files

Domain
detected Domain: bb.tl

XIOC detected Domain: bb.tl

extracted_from_files

Domain
detected Domain: other.tl

XIOC detected Domain: other.tl

extracted_from_files

Domain
detected Domain: other.br

XIOC detected Domain: other.br

extracted_from_files

Domain
detected Domain: data.tl

XIOC detected Domain: data.tl

extracted_from_files

Domain
detected Domain: data.br

XIOC detected Domain: data.br

extracted_from_files

Domain
detected Domain: this.id

XIOC detected Domain: this.id

extracted_from_files

Domain
detected Domain: alienryderflex.com

XIOC detected Domain: alienryderflex.com

extracted_from_files

Domain
detected Domain: bbox.tl

XIOC detected Domain: bbox.tl

extracted_from_files

Domain
detected Domain: bbox.br

XIOC detected Domain: bbox.br

extracted_from_files

Domain
detected Domain: this.tl

XIOC detected Domain: this.tl

extracted_from_files

Domain
detected Domain: this.br

XIOC detected Domain: this.br

extracted_from_files

Domain
detected Domain: a.br

XIOC detected Domain: a.br

extracted_from_files

Domain
detected Domain: 9s.mp

XIOC detected Domain: 9s.mp

extracted_from_files

Domain
detected Domain: claps.play

XIOC detected Domain: claps.play

extracted_from_files

Domain
detected Domain: ev.target

XIOC detected Domain: ev.target

extracted_from_files

Domain
detected Domain: rect.top

XIOC detected Domain: rect.top

extracted_from_files

Domain
detected Domain: www.wikidata.org

XIOC detected Domain: www.wikidata.org

extracted_from_files

Domain
detected Domain: www.freesound.org

XIOC detected Domain: www.freesound.org

extracted_from_files

Domain
detected Domain: paulbourke.net

XIOC detected Domain: paulbourke.net

extracted_from_files

Domain
detected Domain: upload.wikimedia.org

XIOC detected Domain: upload.wikimedia.org

extracted_from_files

Domain
detected Domain: adomas.org

XIOC detected Domain: adomas.org

extracted_from_files

Domain
detected Domain: elem.id

XIOC detected Domain: elem.id

extracted_from_files

Domain
detected Domain: 01.mp

XIOC detected Domain: 01.mp

extracted_from_files

Domain
detected Domain: 02.mp

XIOC detected Domain: 02.mp

extracted_from_files

Domain
detected Domain: 5sec.mp

XIOC detected Domain: 5sec.mp

extracted_from_files

Domain
detected Domain: 8sec.mp

XIOC detected Domain: 8sec.mp

extracted_from_files

Domain
detected Domain: www.publicdomainpictures.net

XIOC detected Domain: www.publicdomainpictures.net

extracted_from_files

Domain
detected Domain: array.map

XIOC detected Domain: array.map

extracted_from_files

Domain
detected Domain: commons.wikimedia.org

XIOC detected Domain: commons.wikimedia.org

extracted_from_files

Domain
detected Domain: a.mw

XIOC detected Domain: a.mw

extracted_from_files

Domain
detected Domain: img.mw

XIOC detected Domain: img.mw

extracted_from_files

URL
detected Domain: defaulturl.search

XIOC detected Domain: defaulturl.search

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: publicdomainpictures.net

XIOC detected Domain: publicdomainpictures.net

extracted_from_files

Domain
detected Domain: js.fi

XIOC detected Domain: js.fi

extracted_from_files

Domain
detected Domain: bw.mw

XIOC detected Domain: bw.mw

extracted_from_files

Domain
detected Domain: ޓ.ws

XIOC detected Domain: ޓ.ws

extracted_from_files

Domain
detected Domain: www.gnu.org

XIOC detected Domain: www.gnu.org

extracted_from_files

Domain
detected Domain: github.com

XIOC detected Domain: github.com

extracted_from_files

Domain
detected Domain: self.chrome

XIOC detected Domain: self.chrome

extracted_from_files

IP
detected IP: 3::f

XIOC detected IP: 3::f

extracted_from_files

IP
detected IP: ::0

XIOC detected IP: ::0

extracted_from_files

IP
detected IP: 8::

XIOC detected IP: 8::

extracted_from_files

IP
detected IP: ::b

XIOC detected IP: ::b

extracted_from_files

IP
detected IP: 1::

XIOC detected IP: 1::

extracted_from_files

IP
detected IP: 0::

XIOC detected IP: 0::

extracted_from_files

Domain
detected Domain: partbox.tl

XIOC detected Domain: partbox.tl

extracted_from_files

Security Analysis Summary

Security Analysis Overview

JSaw Puzzle is a Chrome Web Store extension published by [email protected]. Version 1.11 has been analyzed by the Risky Plugins security platform, receiving a risk score of 56.23/100 (MEDIUM risk) based on 189 security findings.

Risk Assessment

This extension presents moderate security risk. Several findings were detected that may warrant attention. Users should carefully review the permissions and findings before installation.

Findings Breakdown

  • High: 36 finding(s)
  • Medium: 153 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

JSaw Puzzle is published by [email protected] on the Chrome Web Store marketplace. The extension has approximately 95 users.

Recommendation

Exercise caution with this extension. Review the detailed findings and ensure the requested permissions align with the extension's stated functionality before installation.

Frequently Asked Questions