Is "Rotten Tomato Destroyer" on Firefox Add-ons Safe to Install?

Blife · firefox · v1.7.0

Throw rotten tomatoes in websites that you do not like! Throw one by one rotten tomatoes in any area of almost any site on the Internet. We have all heard of or even seen people throwing rotten tomatoes when disappointed in a live performance. Now you have the opportunity to throw tomatoes in websites that deserve it. Tomato website destroyer is always at hand when necessary to blow off steam on sites that really infuriates. Just click on the website destroyer extension icon in the toolbar menu of the browser and throw tomatoes by mouse clicking in the nasty sites. Tomatoes will fall on the webpage and flatten out on its surface, spraying the pulp and juice on the sides. Let the websites know your anger and resentment. Use Tomato destroyer game! And also it can be used for streaming and video to express how your feel about bad web sites, pages and services. In the new release, we have added a collection of objects for throwing in websites: - 🍅Rotten tomato; - 🦠Slime; - 🥚A rotten egg; - 🍌Banana.

Risk Assessment

Analyzed
56.64
out of 100
MEDIUM

246 security findings detected across all analyzers

Firefox extension requesting 7 permissions

Severity Breakdown

0
Critical
23
High
223
Medium
0
Low
0
Info

Finding Categories

23
Malware Signatures
3
Network
220
IoC Indicators

YARA Rules Matched

7 rules(23 hits)
postinstall file manipulation postinstall network communication NoUseWeakRandom postinstall obfuscation postinstall file download postinstall system command postinstall crypto operations

Requested Permissions

7 permissions
https://*/*
Dangerous
http://*/*
Dangerous
<all_urls>

Access and modify data on every website you visit

Dangerous
activeTab
Medium
storage
Low
scripting
Low
declarativeNetRequest
Low

About This Extension

Throw rotten tomatoes in websites that you do not like! Throw one by one rotten tomatoes in any area of almost any site on the Internet. We have all heard of or even seen people throwing rotten tomatoes when disappointed in a live performance. Now you have the opportunity to throw tomatoes in websites that deserve it. Tomato website destroyer is always at hand when necessary to blow off steam on sites that really infuriates. Just click on the website destroyer extension icon in the toolbar menu of the browser and throw tomatoes by mouse clicking in the nasty sites. Tomatoes will fall on the webpage and flatten out on its surface, spraying the pulp and juice on the sides. Let the websites know your anger and resentment. Use Tomato destroyer game! And also it can be used for streaming and video to express how your feel about bad web sites, pages and services. In the new release, we have added a collection of objects for throwing in websites: - 🍅Rotten tomato; - 🦠Slime; - 🥚A rotten egg; - 🍌Banana.

Detailed Findings

26 total

YARA Rule Matches

7 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
58
IP Addresses
8
Domains
152
Strings
220

All Indicators · 220

URL
detected URL: https://addons.mozilla.org/en-US/firefox/addon/$

XIOC detected URL: https://addons.mozilla.org/en-US/firefox/addon/$

extracted_from_files

Domain
detected Domain: mozilla.com

XIOC detected Domain: mozilla.com

extracted_from_files

Hash
detected MD5 Hash: D2C98A3D150733FDFD6011ED6923D41B

XIOC detected MD5 Hash: D2C98A3D150733FDFD6011ED6923D41B

extracted_from_files

Hash
detected MD5 Hash: 687cde733f54b6382a9efd9aab37b0fc

XIOC detected MD5 Hash: 687cde733f54b6382a9efd9aab37b0fc

extracted_from_files

Hash
detected MD5 Hash: 77E1B3B37C4B517F5E31E959636D9A5E

XIOC detected MD5 Hash: 77E1B3B37C4B517F5E31E959636D9A5E

extracted_from_files

Hash
detected MD5 Hash: DD280A0D93DC4B47023D5F86090FAE79

XIOC detected MD5 Hash: DD280A0D93DC4B47023D5F86090FAE79

extracted_from_files

Hash
detected MD5 Hash: 4DF99198582B63B5F8127EA12210391B

XIOC detected MD5 Hash: 4DF99198582B63B5F8127EA12210391B

extracted_from_files

Hash
detected MD5 Hash: C63680FB23DECB32827BFC11A1045027

XIOC detected MD5 Hash: C63680FB23DECB32827BFC11A1045027

extracted_from_files

Hash
detected MD5 Hash: DE80032701B3B991791F0D54C485D77B

XIOC detected MD5 Hash: DE80032701B3B991791F0D54C485D77B

extracted_from_files

Hash
detected MD5 Hash: 4D3086988B7E2A0E52730C3E8530C6B7

XIOC detected MD5 Hash: 4D3086988B7E2A0E52730C3E8530C6B7

extracted_from_files

URL
detected URL: http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9

XIOC detected URL: http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9

extracted_from_files

URL
detected URL: https://support.microsoft.com/kb/2856746

XIOC detected URL: https://support.microsoft.com/kb/2856746

extracted_from_files

URL
detected URL: https://bugs.webkit.org/show_bug.cgi?id=137337

XIOC detected URL: https://bugs.webkit.org/show_bug.cgi?id=137337

extracted_from_files

URL
detected URL: https://bugs.webkit.org/show_bug.cgi?id=29084

XIOC detected URL: https://bugs.webkit.org/show_bug.cgi?id=29084

extracted_from_files

URL
detected URL: https://github.com/jquery/jquery/pull/764

XIOC detected URL: https://github.com/jquery/jquery/pull/764

extracted_from_files

URL
detected URL: https://github.com/jrburke/requirejs/wiki/Updating-existing-libraries#wiki-anon

XIOC detected URL: https://github.com/jrburke/requirejs/wiki/Updating-existing-libraries#wiki-anon

extracted_from_files

URL
detected URL: https://github.com/jquery/jquery/pull/557)

XIOC detected URL: https://github.com/jquery/jquery/pull/557)

extracted_from_files

URL
detected URL: http://erik.eae.net/archives/2007/07/27/18.54.15/#comment-102291

XIOC detected URL: http://erik.eae.net/archives/2007/07/27/18.54.15/#comment-102291

extracted_from_files

URL
detected URL: https://developer.mozilla.org/en-US/docs/CSS/display

XIOC detected URL: https://developer.mozilla.org/en-US/docs/CSS/display

extracted_from_files

URL
detected URL: https://bugzilla.mozilla.org/show_bug.cgi?id=649285

XIOC detected URL: https://bugzilla.mozilla.org/show_bug.cgi?id=649285

extracted_from_files

URL
detected URL: https://bugzilla.mozilla.org/show_bug.cgi?id=491668

XIOC detected URL: https://bugzilla.mozilla.org/show_bug.cgi?id=491668

extracted_from_files

URL
detected URL: http://web.archive.org/web/20100324014747/http://blindsignals.com/index.php/2009/07/jquery-delay/

XIOC detected URL: http://web.archive.org/web/20100324014747/http://blindsignals.com/index.php/2009/07/jquery-delay/

extracted_from_files

URL
detected URL: http://fluidproject.org/blog/2008/01/09/getting-setting-and-removing-tabindex-values-with-javascript/

XIOC detected URL: http://fluidproject.org/blog/2008/01/09/getting-setting-and-removing-tabindex-values-with-javascript/

extracted_from_files

URL
detected URL: http://msdn.microsoft.com/en-us/library/ie/ms536648(v=vs.85).aspx

XIOC detected URL: http://msdn.microsoft.com/en-us/library/ie/ms536648(v=vs.85).aspx

extracted_from_files

URL
detected URL: https://bugzilla.mozilla.org/show_bug.cgi?id=687787

XIOC detected URL: https://bugzilla.mozilla.org/show_bug.cgi?id=687787

extracted_from_files

URL
detected URL: http://www.w3.org/TR/DOM-Level-3-Events/#events-focusevent-event-order

XIOC detected URL: http://www.w3.org/TR/DOM-Level-3-Events/#events-focusevent-event-order

extracted_from_files

URL
detected URL: https://code.google.com/p/chromium/issues/detail?id=449857

XIOC detected URL: https://code.google.com/p/chromium/issues/detail?id=449857

extracted_from_files

URL
detected URL: https://connect.microsoft.com/IE/feedback/details/1736512/

XIOC detected URL: https://connect.microsoft.com/IE/feedback/details/1736512/

extracted_from_files

URL
detected URL: http://jsperf.com/getall-vs-sizzle/2

XIOC detected URL: http://jsperf.com/getall-vs-sizzle/2

extracted_from_files

URL
detected URL: https://code.google.com/p/chromium/issues/detail?id=378607

XIOC detected URL: https://code.google.com/p/chromium/issues/detail?id=378607

extracted_from_files

URL
detected URL: http://dev.w3.org/csswg/cssom/#resolved-values

XIOC detected URL: http://dev.w3.org/csswg/cssom/#resolved-values

extracted_from_files

URL
detected URL: http://www.w3.org/TR/selectors/#lang-pseudo

XIOC detected URL: http://www.w3.org/TR/selectors/#lang-pseudo

extracted_from_files

URL
detected URL: http://www.w3.org/TR/selectors/#empty-pseudo

XIOC detected URL: http://www.w3.org/TR/selectors/#empty-pseudo

extracted_from_files

URL
detected URL: http://msdn.microsoft.com/en-us/library/ms536429%28VS.85%29.aspx

XIOC detected URL: http://msdn.microsoft.com/en-us/library/ms536429%28VS.85%29.aspx

extracted_from_files

URL
detected URL: http://javascript.nwbox.com/IEContentLoaded/

XIOC detected URL: http://javascript.nwbox.com/IEContentLoaded/

extracted_from_files

URL
detected URL: https://developer.mozilla.org/en/Security/CSP)

XIOC detected URL: https://developer.mozilla.org/en/Security/CSP)

extracted_from_files

URL
detected URL: http://www.w3.org/TR/2003/WD-DOM-Level-3-Events-20030331/ecma-script-binding.html

XIOC detected URL: http://www.w3.org/TR/2003/WD-DOM-Level-3-Events-20030331/ecma-script-binding.html

extracted_from_files

URL
detected URL: https://code.google.com/p/chromium/issues/detail?id=470258

XIOC detected URL: https://code.google.com/p/chromium/issues/detail?id=470258

extracted_from_files

URL
detected URL: http://bugs.jquery.com/ticket/13378

XIOC detected URL: http://bugs.jquery.com/ticket/13378

extracted_from_files

URL
detected URL: http://bugs.jquery.com/ticket/12359

XIOC detected URL: http://bugs.jquery.com/ticket/12359

extracted_from_files

URL
detected URL: http://msdn.microsoft.com/en-us/library/ie/hh465388.aspx#attribute_section

XIOC detected URL: http://msdn.microsoft.com/en-us/library/ie/hh465388.aspx#attribute_section

extracted_from_files

URL
detected URL: http://www.w3.org/TR/2011/REC-css3-selectors-20110929/#checked

XIOC detected URL: http://www.w3.org/TR/2011/REC-css3-selectors-20110929/#checked

extracted_from_files

URL
detected URL: https://bugs.webkit.org/show_bug.cgi?id=136851

XIOC detected URL: https://bugs.webkit.org/show_bug.cgi?id=136851

extracted_from_files

URL
detected URL: https://github.com/jquery/sizzle/pull/225

XIOC detected URL: https://github.com/jquery/sizzle/pull/225

extracted_from_files

URL
detected URL: http://www.w3.org/TR/selectors/#pseudo-classes

XIOC detected URL: http://www.w3.org/TR/selectors/#pseudo-classes

extracted_from_files

URL
detected URL: http://jquery.org/license

XIOC detected URL: http://jquery.org/license

extracted_from_files

URL
detected URL: http://weblogs.java.net/blog/driscoll/archive/2009/09/08/eval-javascript-global-context

XIOC detected URL: http://weblogs.java.net/blog/driscoll/archive/2009/09/08/eval-javascript-global-context

extracted_from_files

URL
detected URL: http://jsperf.com/thor-indexof-vs-for/5

XIOC detected URL: http://jsperf.com/thor-indexof-vs-for/5

extracted_from_files

URL
detected URL: http://www.w3.org/TR/css3-selectors/#whitespace

XIOC detected URL: http://www.w3.org/TR/css3-selectors/#whitespace

extracted_from_files

URL
detected URL: http://www.w3.org/TR/CSS21/syndata.html#value-def-identifier

XIOC detected URL: http://www.w3.org/TR/CSS21/syndata.html#value-def-identifier

extracted_from_files

URL
detected URL: http://www.w3.org/TR/selectors/#attribute-selectors

XIOC detected URL: http://www.w3.org/TR/selectors/#attribute-selectors

extracted_from_files

URL
detected URL: http://www.w3.org/TR/CSS21/syndata.html#escaped-characters

XIOC detected URL: http://www.w3.org/TR/CSS21/syndata.html#escaped-characters

extracted_from_files

URL
detected URL: http://ns.adobe.com/tiff/1.0/

XIOC detected URL: http://ns.adobe.com/tiff/1.0/

extracted_from_files

URL
detected URL: http://ns.adobe.com/exif/1.0/

XIOC detected URL: http://ns.adobe.com/exif/1.0/

extracted_from_files

URL
detected URL: https://blife-team.com/'

XIOC detected URL: https://blife-team.com/'

extracted_from_files

Domain
detected Domain: jquery.org

XIOC detected Domain: jquery.org

extracted_from_files

URL
detected URL: https://addons.mozilla.org/firefox/addon/'

XIOC detected URL: https://addons.mozilla.org/firefox/addon/'

extracted_from_files

URL
detected URL: http://jquery.com/

XIOC detected URL: http://jquery.com/

extracted_from_files

URL
detected URL: http://sizzlejs.com/

XIOC detected URL: http://sizzlejs.com/

extracted_from_files

URL
detected URL: http://www.w3.org/1999/02/22-rdf-syntax-ns#

XIOC detected URL: http://www.w3.org/1999/02/22-rdf-syntax-ns#

extracted_from_files

URL
detected URL: http://ns.adobe.com/xap/1.0/

XIOC detected URL: http://ns.adobe.com/xap/1.0/

extracted_from_files

URL
detected URL: http://purl.org/dc/elements/1.1/

XIOC detected URL: http://purl.org/dc/elements/1.1/

extracted_from_files

URL
detected URL: http://ns.adobe.com/photoshop/1.0/

XIOC detected URL: http://ns.adobe.com/photoshop/1.0/

extracted_from_files

URL
detected URL: http://ns.adobe.com/xap/1.0/mm/

XIOC detected URL: http://ns.adobe.com/xap/1.0/mm/

extracted_from_files

URL
detected URL: http://ns.adobe.com/xap/1.0/sType/ResourceEvent#

XIOC detected URL: http://ns.adobe.com/xap/1.0/sType/ResourceEvent#

extracted_from_files

URL
detected URL: http://ns.adobe.com/xap/1.0/sType/ResourceRef#

XIOC detected URL: http://ns.adobe.com/xap/1.0/sType/ResourceRef#

extracted_from_files

Domain
detected Domain: curoffset.top

XIOC detected Domain: curoffset.top

extracted_from_files

Domain
detected Domain: options.using.call

XIOC detected Domain: options.using.call

extracted_from_files

Domain
detected Domain: box.top

XIOC detected Domain: box.top

extracted_from_files

Domain
detected Domain: parentoffset.top

XIOC detected Domain: parentoffset.top

extracted_from_files

Domain
detected Domain: offset.top

XIOC detected Domain: offset.top

extracted_from_files

Domain
detected Domain: boundingrect.top

XIOC detected Domain: boundingrect.top

extracted_from_files

URL
detected URL: http://addons.mozilla.org/ca/crl.pem0N

XIOC detected URL: http://addons.mozilla.org/ca/crl.pem0N

extracted_from_files

Domain
detected Domain: elem.name

XIOC detected Domain: elem.name

extracted_from_files

Domain
detected Domain: xhr.open

XIOC detected Domain: xhr.open

extracted_from_files

Domain
detected Domain: options.data

XIOC detected Domain: options.data

extracted_from_files

Domain
detected Domain: curposition.top

XIOC detected Domain: curposition.top

extracted_from_files

Domain
detected Domain: options.call

XIOC detected Domain: options.call

extracted_from_files

Domain
detected Domain: options.top

XIOC detected Domain: options.top

extracted_from_files

Domain
detected Domain: props.top

XIOC detected Domain: props.top

extracted_from_files

Domain
detected Domain: jqxhr.fail

XIOC detected Domain: jqxhr.fail

extracted_from_files

Domain
detected Domain: s.global

XIOC detected Domain: s.global

extracted_from_files

Domain
detected Domain: s.beforesend.call

XIOC detected Domain: s.beforesend.call

extracted_from_files

Domain
detected Domain: response.data

XIOC detected Domain: response.data

extracted_from_files

Domain
detected Domain: html.call

XIOC detected Domain: html.call

extracted_from_files

Domain
detected Domain: wrap.map

XIOC detected Domain: wrap.map

extracted_from_files

Domain
detected Domain: this.name

XIOC detected Domain: this.name

extracted_from_files

Domain
detected Domain: finish.call

XIOC detected Domain: finish.call

extracted_from_files

Domain
detected Domain: blindsignals.com

XIOC detected Domain: blindsignals.com

extracted_from_files

Domain
detected Domain: support.style

XIOC detected Domain: support.style

extracted_from_files

Domain
detected Domain: attrhandle.id

XIOC detected Domain: attrhandle.id

extracted_from_files

Domain
detected Domain: attrhandle.name

XIOC detected Domain: attrhandle.name

extracted_from_files

Domain
detected Domain: jquery.attrhooks.style

XIOC detected Domain: jquery.attrhooks.style

extracted_from_files

Domain
detected Domain: s.data

XIOC detected Domain: s.data

extracted_from_files

Domain
detected Domain: tween.elem.style

XIOC detected Domain: tween.elem.style

extracted_from_files

Domain
detected Domain: tween.now

XIOC detected Domain: tween.now

extracted_from_files

Domain
detected Domain: animation.opts.start.call

XIOC detected Domain: animation.opts.start.call

extracted_from_files

Domain
detected Domain: animation.opts.fail

XIOC detected Domain: animation.opts.fail

extracted_from_files

Domain
detected Domain: jquery.fx.off

XIOC detected Domain: jquery.fx.off

extracted_from_files

Domain
detected Domain: opt.old.call

XIOC detected Domain: opt.old.call

extracted_from_files

Domain
detected Domain: hooks.stop.call

XIOC detected Domain: hooks.stop.call

extracted_from_files

Domain
detected Domain: data.events

XIOC detected Domain: data.events

extracted_from_files

Domain
detected Domain: this.map

XIOC detected Domain: this.map

extracted_from_files

Domain
detected Domain: elem.style

XIOC detected Domain: elem.style

extracted_from_files

Domain
detected Domain: div.style

XIOC detected Domain: div.style

extracted_from_files

Domain
detected Domain: this.show

XIOC detected Domain: this.show

extracted_from_files

Domain
detected Domain: this.now

XIOC detected Domain: this.now

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

Domain
detected Domain: special.postdispatch.call

XIOC detected Domain: special.postdispatch.call

extracted_from_files

Domain
detected Domain: this.click

XIOC detected Domain: this.click

extracted_from_files

Hash
detected MD5 Hash: B17D3EDF9922D46DF589E16C976CA9DC

XIOC detected MD5 Hash: B17D3EDF9922D46DF589E16C976CA9DC

extracted_from_files

Domain
detected Domain: this.off

XIOC detected Domain: this.off

extracted_from_files

Domain
detected Domain: olddata.events

XIOC detected Domain: olddata.events

extracted_from_files

Domain
detected Domain: curdata.events

XIOC detected Domain: curdata.events

extracted_from_files

Domain
detected Domain: curdata.data

XIOC detected Domain: curdata.data

extracted_from_files

Domain
detected Domain: special.remove.call

XIOC detected Domain: special.remove.call

extracted_from_files

Domain
detected Domain: special.teardown.call

XIOC detected Domain: special.teardown.call

extracted_from_files

Domain
detected Domain: event.target

XIOC detected Domain: event.target

extracted_from_files

Domain
detected Domain: special.predispatch.call

XIOC detected Domain: special.predispatch.call

extracted_from_files

Domain
detected Domain: jquery.event.handlers.call

XIOC detected Domain: jquery.event.handlers.call

extracted_from_files

Domain
detected Domain: event.data

XIOC detected Domain: event.data

extracted_from_files

Domain
detected Domain: handleobj.data

XIOC detected Domain: handleobj.data

extracted_from_files

Domain
detected Domain: value.call

XIOC detected Domain: value.call

extracted_from_files

Domain
detected Domain: wrapmap.th

XIOC detected Domain: wrapmap.th

extracted_from_files

Domain
detected Domain: wrapmap.td

XIOC detected Domain: wrapmap.td

extracted_from_files

Domain
detected Domain: elemdata.events

XIOC detected Domain: elemdata.events

extracted_from_files

Domain
detected Domain: special.setup.call

XIOC detected Domain: special.setup.call

extracted_from_files

Domain
detected Domain: special.add.call

XIOC detected Domain: special.add.call

extracted_from_files

Domain
detected Domain: jquery.event.global

XIOC detected Domain: jquery.event.global

extracted_from_files

Domain
detected Domain: func.call

XIOC detected Domain: func.call

extracted_from_files

Domain
detected Domain: body.style

XIOC detected Domain: body.style

extracted_from_files

Domain
detected Domain: jquery.data

XIOC detected Domain: jquery.data

extracted_from_files

Domain
detected Domain: thiscache.data

XIOC detected Domain: thiscache.data

extracted_from_files

Domain
detected Domain: hooks.empty.fire

XIOC detected Domain: hooks.empty.fire

extracted_from_files

Domain
detected Domain: jquery.style

XIOC detected Domain: jquery.style

extracted_from_files

Domain
detected Domain: bulk.call

XIOC detected Domain: bulk.call

extracted_from_files

Domain
detected Domain: elem.id

XIOC detected Domain: elem.id

extracted_from_files

Domain
detected Domain: sizzle.support

XIOC detected Domain: sizzle.support

extracted_from_files

Domain
detected Domain: parent.top

XIOC detected Domain: parent.top

extracted_from_files

Domain
detected Domain: matches.call

XIOC detected Domain: matches.call

extracted_from_files

Domain
detected Domain: pop.call

XIOC detected Domain: pop.call

extracted_from_files

Domain
detected Domain: sizzle.select

XIOC detected Domain: sizzle.select

extracted_from_files

Domain
detected Domain: qualifier.call

XIOC detected Domain: qualifier.call

extracted_from_files

Domain
detected Domain: jquery.map

XIOC detected Domain: jquery.map

extracted_from_files

Domain
detected Domain: callback.call

XIOC detected Domain: callback.call

extracted_from_files

Domain
detected Domain: hasown.call

XIOC detected Domain: hasown.call

extracted_from_files

Domain
detected Domain: tostring.call

XIOC detected Domain: tostring.call

extracted_from_files

Domain
detected Domain: push.call

XIOC detected Domain: push.call

extracted_from_files

Domain
detected Domain: indexof.call

XIOC detected Domain: indexof.call

extracted_from_files

Domain
detected Domain: jquery.support

XIOC detected Domain: jquery.support

extracted_from_files

Domain
detected Domain: dev.w3.org

XIOC detected Domain: dev.w3.org

extracted_from_files

Domain
detected Domain: erik.eae.net

XIOC detected Domain: erik.eae.net

extracted_from_files

Domain
detected Domain: web.archive.org

XIOC detected Domain: web.archive.org

extracted_from_files

Domain
detected Domain: fluidproject.org

XIOC detected Domain: fluidproject.org

extracted_from_files

Domain
detected Domain: support.microsoft.com

XIOC detected Domain: support.microsoft.com

extracted_from_files

Domain
detected Domain: asp.net

XIOC detected Domain: asp.net

extracted_from_files

Domain
detected Domain: slice.call

XIOC detected Domain: slice.call

extracted_from_files

Domain
detected Domain: bugs.webkit.org

XIOC detected Domain: bugs.webkit.org

extracted_from_files

Domain
detected Domain: github.com

XIOC detected Domain: github.com

extracted_from_files

IP
detected Domain: javascript.nwbox.com

XIOC detected Domain: javascript.nwbox.com

extracted_from_files

Domain
detected Domain: developer.mozilla.org

XIOC detected Domain: developer.mozilla.org

extracted_from_files

Domain
detected Domain: code.google.com

XIOC detected Domain: code.google.com

extracted_from_files

Domain
detected Domain: bugzilla.mozilla.org

XIOC detected Domain: bugzilla.mozilla.org

extracted_from_files

Domain
detected Domain: connect.microsoft.com

XIOC detected Domain: connect.microsoft.com

extracted_from_files

Domain
detected Domain: jquery.com

XIOC detected Domain: jquery.com

extracted_from_files

Domain
detected Domain: sizzlejs.com

XIOC detected Domain: sizzlejs.com

extracted_from_files

Domain
detected Domain: jquery.now

XIOC detected Domain: jquery.now

extracted_from_files

Domain
detected Domain: weblogs.java.net

XIOC detected Domain: weblogs.java.net

extracted_from_files

Domain
detected Domain: jsperf.com

XIOC detected Domain: jsperf.com

extracted_from_files

Domain
detected Domain: bugs.jquery.com

XIOC detected Domain: bugs.jquery.com

extracted_from_files

Domain
detected Domain: msdn.microsoft.com

XIOC detected Domain: msdn.microsoft.com

extracted_from_files

Domain
detected Domain: k.br

XIOC detected Domain: k.br

extracted_from_files

Domain
detected Domain: e.target

XIOC detected Domain: e.target

extracted_from_files

Domain
detected Domain: location.host

XIOC detected Domain: location.host

extracted_from_files

Domain
detected Domain: audio.play

XIOC detected Domain: audio.play

extracted_from_files

Domain
detected Domain: hole.style.top

XIOC detected Domain: hole.style.top

extracted_from_files

Domain
detected Domain: items.is

XIOC detected Domain: items.is

extracted_from_files

Domain
detected Domain: window.top

XIOC detected Domain: window.top

extracted_from_files

Domain
detected Domain: extendoptions.name

XIOC detected Domain: extendoptions.name

extracted_from_files

Domain
detected Domain: super.options.name

XIOC detected Domain: super.options.name

extracted_from_files

Domain
detected Domain: locstr.top

XIOC detected Domain: locstr.top

extracted_from_files

Domain
detected Domain: cb.call

XIOC detected Domain: cb.call

extracted_from_files

Domain
detected Domain: konh.se

XIOC detected Domain: konh.se

extracted_from_files

Domain
detected Domain: 5.kg

XIOC detected Domain: 5.kg

extracted_from_files

Domain
detected Domain: y.ch

XIOC detected Domain: y.ch

extracted_from_files

Domain
detected Domain: attr.name

XIOC detected Domain: attr.name

extracted_from_files

Domain
detected Domain: fn.call

XIOC detected Domain: fn.call

extracted_from_files

Domain
detected Domain: parentvnode.data

XIOC detected Domain: parentvnode.data

extracted_from_files

Domain
detected Domain: dir.name

XIOC detected Domain: dir.name

extracted_from_files

Domain
detected Domain: listpool.id

XIOC detected Domain: listpool.id

extracted_from_files

Domain
detected Domain: dep.target

XIOC detected Domain: dep.target

extracted_from_files

Domain
detected Domain: data.style

XIOC detected Domain: data.style

extracted_from_files

Domain
detected Domain: listpool.map

XIOC detected Domain: listpool.map

extracted_from_files

Domain
detected Domain: dep.id

XIOC detected Domain: dep.id

extracted_from_files

Domain
detected Domain: child.data

XIOC detected Domain: child.data

extracted_from_files

Domain
detected Domain: imgext.data

XIOC detected Domain: imgext.data

extracted_from_files

Domain
detected Domain: linesize.click

XIOC detected Domain: linesize.click

extracted_from_files

Domain
detected Domain: opts.data

XIOC detected Domain: opts.data

extracted_from_files

Domain
detected Domain: opts.watch

XIOC detected Domain: opts.watch

extracted_from_files

Domain
detected Domain: tab.id

XIOC detected Domain: tab.id

extracted_from_files

Domain
detected Domain: request.open

XIOC detected Domain: request.open

extracted_from_files

Domain
detected Domain: chrome.runtime.id

XIOC detected Domain: chrome.runtime.id

extracted_from_files

Domain
detected Domain: sender.tab.id

XIOC detected Domain: sender.tab.id

extracted_from_files

Domain
detected Domain: e.map

XIOC detected Domain: e.map

extracted_from_files

IP
detected Domain: viewtip.id

XIOC detected Domain: viewtip.id

extracted_from_files

Domain
detected Domain: opts.ctor.options.name

XIOC detected Domain: opts.ctor.options.name

extracted_from_files

Domain
detected Domain: addons.mozilla.org

XIOC detected Domain: addons.mozilla.org

extracted_from_files

Domain
detected Domain: content-signature.mozilla.org

XIOC detected Domain: content-signature.mozilla.org

extracted_from_files

Domain
detected Domain: t2de7c129b60d032a373b751c42fac857.687cde733f54b6382a9efd9aab37b0fc.addons.mozilla.org

XIOC detected Domain: t2de7c129b60d032a373b751c42fac857.687cde733f54b6382a9efd9aab37b0fc.addons.mozilla.org

extracted_from_files

Domain
detected Domain: www.w3.org

XIOC detected Domain: www.w3.org

extracted_from_files

Domain
detected Domain: ns.adobe.com

XIOC detected Domain: ns.adobe.com

extracted_from_files

URL
detected Domain: purl.org

XIOC detected Domain: purl.org

extracted_from_files

Domain
detected Domain: blife-team.com

XIOC detected Domain: blife-team.com

extracted_from_files

IP
detected IP: 8::

XIOC detected IP: 8::

extracted_from_files

Domain
detected Domain: slime.mp

XIOC detected Domain: slime.mp

extracted_from_files

Domain
detected Domain: egg.mp

XIOC detected Domain: egg.mp

extracted_from_files

Domain
detected Domain: tomato.mp

XIOC detected Domain: tomato.mp

extracted_from_files

Domain
detected Domain: banana.mp

XIOC detected Domain: banana.mp

extracted_from_files

Domain
detected Domain: signingca1.addons.mozilla.org

XIOC detected Domain: signingca1.addons.mozilla.org

extracted_from_files

Domain
detected Domain: this.options.step.call

XIOC detected Domain: this.options.step.call

extracted_from_files

Security Analysis Summary

Security Analysis Overview

Rotten Tomato Destroyer is a Firefox Add-ons extension published by Blife. Version 1.7.0 has been analyzed by the Risky Plugins security platform, receiving a risk score of 56.64/100 (MEDIUM risk) based on 246 security findings.

Risk Assessment

This extension presents moderate security risk. Several findings were detected that may warrant attention. Users should carefully review the permissions and findings before installation.

Findings Breakdown

  • High: 23 finding(s)
  • Medium: 223 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

Rotten Tomato Destroyer is published by Blife on the Firefox Add-ons marketplace. The extension has approximately 61 users.

Recommendation

Exercise caution with this extension. Review the detailed findings and ensure the requested permissions align with the extension's stated functionality before installation.

Frequently Asked Questions