Is "Rotten Tomato Destroyer" on Firefox Add-ons Safe to Install?
Throw rotten tomatoes in websites that you do not like! Throw one by one rotten tomatoes in any area of almost any site on the Internet. We have all heard of or even seen people throwing rotten tomatoes when disappointed in a live performance. Now you have the opportunity to throw tomatoes in websites that deserve it. Tomato website destroyer is always at hand when necessary to blow off steam on sites that really infuriates. Just click on the website destroyer extension icon in the toolbar menu of the browser and throw tomatoes by mouse clicking in the nasty sites. Tomatoes will fall on the webpage and flatten out on its surface, spraying the pulp and juice on the sides. Let the websites know your anger and resentment. Use Tomato destroyer game! And also it can be used for streaming and video to express how your feel about bad web sites, pages and services. In the new release, we have added a collection of objects for throwing in websites: - 🍅Rotten tomato; - 🦠Slime; - 🥚A rotten egg; - 🍌Banana.
Risk Assessment
Analyzed246 security findings detected across all analyzers
Firefox extension requesting 7 permissions
Severity Breakdown
Finding Categories
YARA Rules Matched
7 rules(23 hits)Requested Permissions
7 permissionsAccess and modify data on every website you visit
About This Extension
Detailed Findings
26 totalYARA Rule Matches
7 rulesIndicators of Compromise
Network indicators, suspicious strings, and potential IoCs extracted during analysis
All Indicators · 220
detected URL: https://addons.mozilla.org/en-US/firefox/addon/$ XIOC detected URL: https://addons.mozilla.org/en-US/firefox/addon/$
extracted_from_files
detected Domain: mozilla.com XIOC detected Domain: mozilla.com
extracted_from_files
detected MD5 Hash: D2C98A3D150733FDFD6011ED6923D41B XIOC detected MD5 Hash: D2C98A3D150733FDFD6011ED6923D41B
extracted_from_files
detected MD5 Hash: 687cde733f54b6382a9efd9aab37b0fc XIOC detected MD5 Hash: 687cde733f54b6382a9efd9aab37b0fc
extracted_from_files
detected MD5 Hash: 77E1B3B37C4B517F5E31E959636D9A5E XIOC detected MD5 Hash: 77E1B3B37C4B517F5E31E959636D9A5E
extracted_from_files
detected MD5 Hash: DD280A0D93DC4B47023D5F86090FAE79 XIOC detected MD5 Hash: DD280A0D93DC4B47023D5F86090FAE79
extracted_from_files
detected MD5 Hash: 4DF99198582B63B5F8127EA12210391B XIOC detected MD5 Hash: 4DF99198582B63B5F8127EA12210391B
extracted_from_files
detected MD5 Hash: C63680FB23DECB32827BFC11A1045027 XIOC detected MD5 Hash: C63680FB23DECB32827BFC11A1045027
extracted_from_files
detected MD5 Hash: DE80032701B3B991791F0D54C485D77B XIOC detected MD5 Hash: DE80032701B3B991791F0D54C485D77B
extracted_from_files
detected MD5 Hash: 4D3086988B7E2A0E52730C3E8530C6B7 XIOC detected MD5 Hash: 4D3086988B7E2A0E52730C3E8530C6B7
extracted_from_files
detected URL: http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9 XIOC detected URL: http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9
extracted_from_files
detected URL: https://support.microsoft.com/kb/2856746 XIOC detected URL: https://support.microsoft.com/kb/2856746
extracted_from_files
detected URL: https://bugs.webkit.org/show_bug.cgi?id=137337 XIOC detected URL: https://bugs.webkit.org/show_bug.cgi?id=137337
extracted_from_files
detected URL: https://bugs.webkit.org/show_bug.cgi?id=29084 XIOC detected URL: https://bugs.webkit.org/show_bug.cgi?id=29084
extracted_from_files
detected URL: https://github.com/jquery/jquery/pull/764 XIOC detected URL: https://github.com/jquery/jquery/pull/764
extracted_from_files
detected URL: https://github.com/jrburke/requirejs/wiki/Updating-existing-libraries#wiki-anon XIOC detected URL: https://github.com/jrburke/requirejs/wiki/Updating-existing-libraries#wiki-anon
extracted_from_files
detected URL: https://github.com/jquery/jquery/pull/557) XIOC detected URL: https://github.com/jquery/jquery/pull/557)
extracted_from_files
detected URL: http://erik.eae.net/archives/2007/07/27/18.54.15/#comment-102291 XIOC detected URL: http://erik.eae.net/archives/2007/07/27/18.54.15/#comment-102291
extracted_from_files
detected URL: https://developer.mozilla.org/en-US/docs/CSS/display XIOC detected URL: https://developer.mozilla.org/en-US/docs/CSS/display
extracted_from_files
detected URL: https://bugzilla.mozilla.org/show_bug.cgi?id=649285 XIOC detected URL: https://bugzilla.mozilla.org/show_bug.cgi?id=649285
extracted_from_files
detected URL: https://bugzilla.mozilla.org/show_bug.cgi?id=491668 XIOC detected URL: https://bugzilla.mozilla.org/show_bug.cgi?id=491668
extracted_from_files
detected URL: http://web.archive.org/web/20100324014747/http://blindsignals.com/index.php/2009/07/jquery-delay/ XIOC detected URL: http://web.archive.org/web/20100324014747/http://blindsignals.com/index.php/2009/07/jquery-delay/
extracted_from_files
detected URL: http://fluidproject.org/blog/2008/01/09/getting-setting-and-removing-tabindex-values-with-javascript/ XIOC detected URL: http://fluidproject.org/blog/2008/01/09/getting-setting-and-removing-tabindex-values-with-javascript/
extracted_from_files
detected URL: http://msdn.microsoft.com/en-us/library/ie/ms536648(v=vs.85).aspx XIOC detected URL: http://msdn.microsoft.com/en-us/library/ie/ms536648(v=vs.85).aspx
extracted_from_files
detected URL: https://bugzilla.mozilla.org/show_bug.cgi?id=687787 XIOC detected URL: https://bugzilla.mozilla.org/show_bug.cgi?id=687787
extracted_from_files
detected URL: http://www.w3.org/TR/DOM-Level-3-Events/#events-focusevent-event-order XIOC detected URL: http://www.w3.org/TR/DOM-Level-3-Events/#events-focusevent-event-order
extracted_from_files
detected URL: https://code.google.com/p/chromium/issues/detail?id=449857 XIOC detected URL: https://code.google.com/p/chromium/issues/detail?id=449857
extracted_from_files
detected URL: https://connect.microsoft.com/IE/feedback/details/1736512/ XIOC detected URL: https://connect.microsoft.com/IE/feedback/details/1736512/
extracted_from_files
detected URL: http://jsperf.com/getall-vs-sizzle/2 XIOC detected URL: http://jsperf.com/getall-vs-sizzle/2
extracted_from_files
detected URL: https://code.google.com/p/chromium/issues/detail?id=378607 XIOC detected URL: https://code.google.com/p/chromium/issues/detail?id=378607
extracted_from_files
detected URL: http://dev.w3.org/csswg/cssom/#resolved-values XIOC detected URL: http://dev.w3.org/csswg/cssom/#resolved-values
extracted_from_files
detected URL: http://www.w3.org/TR/selectors/#lang-pseudo XIOC detected URL: http://www.w3.org/TR/selectors/#lang-pseudo
extracted_from_files
detected URL: http://www.w3.org/TR/selectors/#empty-pseudo XIOC detected URL: http://www.w3.org/TR/selectors/#empty-pseudo
extracted_from_files
detected URL: http://msdn.microsoft.com/en-us/library/ms536429%28VS.85%29.aspx XIOC detected URL: http://msdn.microsoft.com/en-us/library/ms536429%28VS.85%29.aspx
extracted_from_files
detected URL: http://javascript.nwbox.com/IEContentLoaded/ XIOC detected URL: http://javascript.nwbox.com/IEContentLoaded/
extracted_from_files
detected URL: https://developer.mozilla.org/en/Security/CSP) XIOC detected URL: https://developer.mozilla.org/en/Security/CSP)
extracted_from_files
detected URL: http://www.w3.org/TR/2003/WD-DOM-Level-3-Events-20030331/ecma-script-binding.html XIOC detected URL: http://www.w3.org/TR/2003/WD-DOM-Level-3-Events-20030331/ecma-script-binding.html
extracted_from_files
detected URL: https://code.google.com/p/chromium/issues/detail?id=470258 XIOC detected URL: https://code.google.com/p/chromium/issues/detail?id=470258
extracted_from_files
detected URL: http://bugs.jquery.com/ticket/13378 XIOC detected URL: http://bugs.jquery.com/ticket/13378
extracted_from_files
detected URL: http://bugs.jquery.com/ticket/12359 XIOC detected URL: http://bugs.jquery.com/ticket/12359
extracted_from_files
detected URL: http://msdn.microsoft.com/en-us/library/ie/hh465388.aspx#attribute_section XIOC detected URL: http://msdn.microsoft.com/en-us/library/ie/hh465388.aspx#attribute_section
extracted_from_files
detected URL: http://www.w3.org/TR/2011/REC-css3-selectors-20110929/#checked XIOC detected URL: http://www.w3.org/TR/2011/REC-css3-selectors-20110929/#checked
extracted_from_files
detected URL: https://bugs.webkit.org/show_bug.cgi?id=136851 XIOC detected URL: https://bugs.webkit.org/show_bug.cgi?id=136851
extracted_from_files
detected URL: https://github.com/jquery/sizzle/pull/225 XIOC detected URL: https://github.com/jquery/sizzle/pull/225
extracted_from_files
detected URL: http://www.w3.org/TR/selectors/#pseudo-classes XIOC detected URL: http://www.w3.org/TR/selectors/#pseudo-classes
extracted_from_files
detected URL: http://jquery.org/license XIOC detected URL: http://jquery.org/license
extracted_from_files
detected URL: http://weblogs.java.net/blog/driscoll/archive/2009/09/08/eval-javascript-global-context XIOC detected URL: http://weblogs.java.net/blog/driscoll/archive/2009/09/08/eval-javascript-global-context
extracted_from_files
detected URL: http://jsperf.com/thor-indexof-vs-for/5 XIOC detected URL: http://jsperf.com/thor-indexof-vs-for/5
extracted_from_files
detected URL: http://www.w3.org/TR/css3-selectors/#whitespace XIOC detected URL: http://www.w3.org/TR/css3-selectors/#whitespace
extracted_from_files
detected URL: http://www.w3.org/TR/CSS21/syndata.html#value-def-identifier XIOC detected URL: http://www.w3.org/TR/CSS21/syndata.html#value-def-identifier
extracted_from_files
detected URL: http://www.w3.org/TR/selectors/#attribute-selectors XIOC detected URL: http://www.w3.org/TR/selectors/#attribute-selectors
extracted_from_files
detected URL: http://www.w3.org/TR/CSS21/syndata.html#escaped-characters XIOC detected URL: http://www.w3.org/TR/CSS21/syndata.html#escaped-characters
extracted_from_files
detected URL: http://ns.adobe.com/tiff/1.0/ XIOC detected URL: http://ns.adobe.com/tiff/1.0/
extracted_from_files
detected URL: http://ns.adobe.com/exif/1.0/ XIOC detected URL: http://ns.adobe.com/exif/1.0/
extracted_from_files
detected URL: https://blife-team.com/' XIOC detected URL: https://blife-team.com/'
extracted_from_files
detected Domain: jquery.org XIOC detected Domain: jquery.org
extracted_from_files
detected URL: https://addons.mozilla.org/firefox/addon/' XIOC detected URL: https://addons.mozilla.org/firefox/addon/'
extracted_from_files
detected URL: http://jquery.com/ XIOC detected URL: http://jquery.com/
extracted_from_files
detected URL: http://sizzlejs.com/ XIOC detected URL: http://sizzlejs.com/
extracted_from_files
detected URL: http://www.w3.org/1999/02/22-rdf-syntax-ns# XIOC detected URL: http://www.w3.org/1999/02/22-rdf-syntax-ns#
extracted_from_files
detected URL: http://ns.adobe.com/xap/1.0/ XIOC detected URL: http://ns.adobe.com/xap/1.0/
extracted_from_files
detected URL: http://purl.org/dc/elements/1.1/ XIOC detected URL: http://purl.org/dc/elements/1.1/
extracted_from_files
detected URL: http://ns.adobe.com/photoshop/1.0/ XIOC detected URL: http://ns.adobe.com/photoshop/1.0/
extracted_from_files
detected URL: http://ns.adobe.com/xap/1.0/mm/ XIOC detected URL: http://ns.adobe.com/xap/1.0/mm/
extracted_from_files
detected URL: http://ns.adobe.com/xap/1.0/sType/ResourceEvent# XIOC detected URL: http://ns.adobe.com/xap/1.0/sType/ResourceEvent#
extracted_from_files
detected URL: http://ns.adobe.com/xap/1.0/sType/ResourceRef# XIOC detected URL: http://ns.adobe.com/xap/1.0/sType/ResourceRef#
extracted_from_files
detected Domain: curoffset.top XIOC detected Domain: curoffset.top
extracted_from_files
detected Domain: options.using.call XIOC detected Domain: options.using.call
extracted_from_files
detected Domain: box.top XIOC detected Domain: box.top
extracted_from_files
detected Domain: parentoffset.top XIOC detected Domain: parentoffset.top
extracted_from_files
detected Domain: offset.top XIOC detected Domain: offset.top
extracted_from_files
detected Domain: boundingrect.top XIOC detected Domain: boundingrect.top
extracted_from_files
detected URL: http://addons.mozilla.org/ca/crl.pem0N XIOC detected URL: http://addons.mozilla.org/ca/crl.pem0N
extracted_from_files
detected Domain: elem.name XIOC detected Domain: elem.name
extracted_from_files
detected Domain: xhr.open XIOC detected Domain: xhr.open
extracted_from_files
detected Domain: options.data XIOC detected Domain: options.data
extracted_from_files
detected Domain: curposition.top XIOC detected Domain: curposition.top
extracted_from_files
detected Domain: options.call XIOC detected Domain: options.call
extracted_from_files
detected Domain: options.top XIOC detected Domain: options.top
extracted_from_files
detected Domain: props.top XIOC detected Domain: props.top
extracted_from_files
detected Domain: jqxhr.fail XIOC detected Domain: jqxhr.fail
extracted_from_files
detected Domain: s.global XIOC detected Domain: s.global
extracted_from_files
detected Domain: s.beforesend.call XIOC detected Domain: s.beforesend.call
extracted_from_files
detected Domain: response.data XIOC detected Domain: response.data
extracted_from_files
detected Domain: html.call XIOC detected Domain: html.call
extracted_from_files
detected Domain: wrap.map XIOC detected Domain: wrap.map
extracted_from_files
detected Domain: this.name XIOC detected Domain: this.name
extracted_from_files
detected Domain: finish.call XIOC detected Domain: finish.call
extracted_from_files
detected Domain: blindsignals.com XIOC detected Domain: blindsignals.com
extracted_from_files
detected Domain: support.style XIOC detected Domain: support.style
extracted_from_files
detected Domain: attrhandle.id XIOC detected Domain: attrhandle.id
extracted_from_files
detected Domain: attrhandle.name XIOC detected Domain: attrhandle.name
extracted_from_files
detected Domain: jquery.attrhooks.style XIOC detected Domain: jquery.attrhooks.style
extracted_from_files
detected Domain: s.data XIOC detected Domain: s.data
extracted_from_files
detected Domain: tween.elem.style XIOC detected Domain: tween.elem.style
extracted_from_files
detected Domain: tween.now XIOC detected Domain: tween.now
extracted_from_files
detected Domain: animation.opts.start.call XIOC detected Domain: animation.opts.start.call
extracted_from_files
detected Domain: animation.opts.fail XIOC detected Domain: animation.opts.fail
extracted_from_files
detected Domain: jquery.fx.off XIOC detected Domain: jquery.fx.off
extracted_from_files
detected Domain: opt.old.call XIOC detected Domain: opt.old.call
extracted_from_files
detected Domain: hooks.stop.call XIOC detected Domain: hooks.stop.call
extracted_from_files
detected Domain: data.events XIOC detected Domain: data.events
extracted_from_files
detected Domain: this.map XIOC detected Domain: this.map
extracted_from_files
detected Domain: elem.style XIOC detected Domain: elem.style
extracted_from_files
detected Domain: div.style XIOC detected Domain: div.style
extracted_from_files
detected Domain: this.show XIOC detected Domain: this.show
extracted_from_files
detected Domain: this.now XIOC detected Domain: this.now
extracted_from_files
detected IP: :: XIOC detected IP: ::
extracted_from_files
detected Domain: special.postdispatch.call XIOC detected Domain: special.postdispatch.call
extracted_from_files
detected Domain: this.click XIOC detected Domain: this.click
extracted_from_files
detected MD5 Hash: B17D3EDF9922D46DF589E16C976CA9DC XIOC detected MD5 Hash: B17D3EDF9922D46DF589E16C976CA9DC
extracted_from_files
detected Domain: this.off XIOC detected Domain: this.off
extracted_from_files
detected Domain: olddata.events XIOC detected Domain: olddata.events
extracted_from_files
detected Domain: curdata.events XIOC detected Domain: curdata.events
extracted_from_files
detected Domain: curdata.data XIOC detected Domain: curdata.data
extracted_from_files
detected Domain: special.remove.call XIOC detected Domain: special.remove.call
extracted_from_files
detected Domain: special.teardown.call XIOC detected Domain: special.teardown.call
extracted_from_files
detected Domain: event.target XIOC detected Domain: event.target
extracted_from_files
detected Domain: special.predispatch.call XIOC detected Domain: special.predispatch.call
extracted_from_files
detected Domain: jquery.event.handlers.call XIOC detected Domain: jquery.event.handlers.call
extracted_from_files
detected Domain: event.data XIOC detected Domain: event.data
extracted_from_files
detected Domain: handleobj.data XIOC detected Domain: handleobj.data
extracted_from_files
detected Domain: value.call XIOC detected Domain: value.call
extracted_from_files
detected Domain: wrapmap.th XIOC detected Domain: wrapmap.th
extracted_from_files
detected Domain: wrapmap.td XIOC detected Domain: wrapmap.td
extracted_from_files
detected Domain: elemdata.events XIOC detected Domain: elemdata.events
extracted_from_files
detected Domain: special.setup.call XIOC detected Domain: special.setup.call
extracted_from_files
detected Domain: special.add.call XIOC detected Domain: special.add.call
extracted_from_files
detected Domain: jquery.event.global XIOC detected Domain: jquery.event.global
extracted_from_files
detected Domain: func.call XIOC detected Domain: func.call
extracted_from_files
detected Domain: body.style XIOC detected Domain: body.style
extracted_from_files
detected Domain: jquery.data XIOC detected Domain: jquery.data
extracted_from_files
detected Domain: thiscache.data XIOC detected Domain: thiscache.data
extracted_from_files
detected Domain: hooks.empty.fire XIOC detected Domain: hooks.empty.fire
extracted_from_files
detected Domain: jquery.style XIOC detected Domain: jquery.style
extracted_from_files
detected Domain: bulk.call XIOC detected Domain: bulk.call
extracted_from_files
detected Domain: elem.id XIOC detected Domain: elem.id
extracted_from_files
detected Domain: sizzle.support XIOC detected Domain: sizzle.support
extracted_from_files
detected Domain: parent.top XIOC detected Domain: parent.top
extracted_from_files
detected Domain: matches.call XIOC detected Domain: matches.call
extracted_from_files
detected Domain: pop.call XIOC detected Domain: pop.call
extracted_from_files
detected Domain: sizzle.select XIOC detected Domain: sizzle.select
extracted_from_files
detected Domain: qualifier.call XIOC detected Domain: qualifier.call
extracted_from_files
detected Domain: jquery.map XIOC detected Domain: jquery.map
extracted_from_files
detected Domain: callback.call XIOC detected Domain: callback.call
extracted_from_files
detected Domain: hasown.call XIOC detected Domain: hasown.call
extracted_from_files
detected Domain: tostring.call XIOC detected Domain: tostring.call
extracted_from_files
detected Domain: push.call XIOC detected Domain: push.call
extracted_from_files
detected Domain: indexof.call XIOC detected Domain: indexof.call
extracted_from_files
detected Domain: jquery.support XIOC detected Domain: jquery.support
extracted_from_files
detected Domain: dev.w3.org XIOC detected Domain: dev.w3.org
extracted_from_files
detected Domain: erik.eae.net XIOC detected Domain: erik.eae.net
extracted_from_files
detected Domain: web.archive.org XIOC detected Domain: web.archive.org
extracted_from_files
detected Domain: fluidproject.org XIOC detected Domain: fluidproject.org
extracted_from_files
detected Domain: support.microsoft.com XIOC detected Domain: support.microsoft.com
extracted_from_files
detected Domain: asp.net XIOC detected Domain: asp.net
extracted_from_files
detected Domain: slice.call XIOC detected Domain: slice.call
extracted_from_files
detected Domain: bugs.webkit.org XIOC detected Domain: bugs.webkit.org
extracted_from_files
detected Domain: github.com XIOC detected Domain: github.com
extracted_from_files
detected Domain: javascript.nwbox.com XIOC detected Domain: javascript.nwbox.com
extracted_from_files
detected Domain: developer.mozilla.org XIOC detected Domain: developer.mozilla.org
extracted_from_files
detected Domain: code.google.com XIOC detected Domain: code.google.com
extracted_from_files
detected Domain: bugzilla.mozilla.org XIOC detected Domain: bugzilla.mozilla.org
extracted_from_files
detected Domain: connect.microsoft.com XIOC detected Domain: connect.microsoft.com
extracted_from_files
detected Domain: jquery.com XIOC detected Domain: jquery.com
extracted_from_files
detected Domain: sizzlejs.com XIOC detected Domain: sizzlejs.com
extracted_from_files
detected Domain: jquery.now XIOC detected Domain: jquery.now
extracted_from_files
detected Domain: weblogs.java.net XIOC detected Domain: weblogs.java.net
extracted_from_files
detected Domain: jsperf.com XIOC detected Domain: jsperf.com
extracted_from_files
detected Domain: bugs.jquery.com XIOC detected Domain: bugs.jquery.com
extracted_from_files
detected Domain: msdn.microsoft.com XIOC detected Domain: msdn.microsoft.com
extracted_from_files
detected Domain: k.br XIOC detected Domain: k.br
extracted_from_files
detected Domain: e.target XIOC detected Domain: e.target
extracted_from_files
detected Domain: location.host XIOC detected Domain: location.host
extracted_from_files
detected Domain: audio.play XIOC detected Domain: audio.play
extracted_from_files
detected Domain: hole.style.top XIOC detected Domain: hole.style.top
extracted_from_files
detected Domain: items.is XIOC detected Domain: items.is
extracted_from_files
detected Domain: window.top XIOC detected Domain: window.top
extracted_from_files
detected Domain: extendoptions.name XIOC detected Domain: extendoptions.name
extracted_from_files
detected Domain: super.options.name XIOC detected Domain: super.options.name
extracted_from_files
detected Domain: locstr.top XIOC detected Domain: locstr.top
extracted_from_files
detected Domain: cb.call XIOC detected Domain: cb.call
extracted_from_files
detected Domain: konh.se XIOC detected Domain: konh.se
extracted_from_files
detected Domain: 5.kg XIOC detected Domain: 5.kg
extracted_from_files
detected Domain: y.ch XIOC detected Domain: y.ch
extracted_from_files
detected Domain: attr.name XIOC detected Domain: attr.name
extracted_from_files
detected Domain: fn.call XIOC detected Domain: fn.call
extracted_from_files
detected Domain: parentvnode.data XIOC detected Domain: parentvnode.data
extracted_from_files
detected Domain: dir.name XIOC detected Domain: dir.name
extracted_from_files
detected Domain: listpool.id XIOC detected Domain: listpool.id
extracted_from_files
detected Domain: dep.target XIOC detected Domain: dep.target
extracted_from_files
detected Domain: data.style XIOC detected Domain: data.style
extracted_from_files
detected Domain: listpool.map XIOC detected Domain: listpool.map
extracted_from_files
detected Domain: dep.id XIOC detected Domain: dep.id
extracted_from_files
detected Domain: child.data XIOC detected Domain: child.data
extracted_from_files
detected Domain: imgext.data XIOC detected Domain: imgext.data
extracted_from_files
detected Domain: linesize.click XIOC detected Domain: linesize.click
extracted_from_files
detected Domain: opts.data XIOC detected Domain: opts.data
extracted_from_files
detected Domain: opts.watch XIOC detected Domain: opts.watch
extracted_from_files
detected Domain: tab.id XIOC detected Domain: tab.id
extracted_from_files
detected Domain: request.open XIOC detected Domain: request.open
extracted_from_files
detected Domain: chrome.runtime.id XIOC detected Domain: chrome.runtime.id
extracted_from_files
detected Domain: sender.tab.id XIOC detected Domain: sender.tab.id
extracted_from_files
detected Domain: e.map XIOC detected Domain: e.map
extracted_from_files
detected Domain: viewtip.id XIOC detected Domain: viewtip.id
extracted_from_files
detected Domain: opts.ctor.options.name XIOC detected Domain: opts.ctor.options.name
extracted_from_files
detected Domain: addons.mozilla.org XIOC detected Domain: addons.mozilla.org
extracted_from_files
detected Domain: content-signature.mozilla.org XIOC detected Domain: content-signature.mozilla.org
extracted_from_files
detected Domain: t2de7c129b60d032a373b751c42fac857.687cde733f54b6382a9efd9aab37b0fc.addons.mozilla.org XIOC detected Domain: t2de7c129b60d032a373b751c42fac857.687cde733f54b6382a9efd9aab37b0fc.addons.mozilla.org
extracted_from_files
detected Domain: www.w3.org XIOC detected Domain: www.w3.org
extracted_from_files
detected Domain: ns.adobe.com XIOC detected Domain: ns.adobe.com
extracted_from_files
detected Domain: purl.org XIOC detected Domain: purl.org
extracted_from_files
detected Domain: blife-team.com XIOC detected Domain: blife-team.com
extracted_from_files
detected IP: 8:: XIOC detected IP: 8::
extracted_from_files
detected Domain: slime.mp XIOC detected Domain: slime.mp
extracted_from_files
detected Domain: egg.mp XIOC detected Domain: egg.mp
extracted_from_files
detected Domain: tomato.mp XIOC detected Domain: tomato.mp
extracted_from_files
detected Domain: banana.mp XIOC detected Domain: banana.mp
extracted_from_files
detected Domain: signingca1.addons.mozilla.org XIOC detected Domain: signingca1.addons.mozilla.org
extracted_from_files
detected Domain: this.options.step.call XIOC detected Domain: this.options.step.call
extracted_from_files
Security Analysis Summary
Security Analysis Overview
Rotten Tomato Destroyer is a Firefox Add-ons extension published by Blife. Version 1.7.0 has been analyzed by the Risky Plugins security platform, receiving a risk score of 56.64/100 (MEDIUM risk) based on 246 security findings.
Risk Assessment
This extension presents moderate security risk. Several findings were detected that may warrant attention. Users should carefully review the permissions and findings before installation.
Findings Breakdown
- High: 23 finding(s)
- Medium: 223 finding(s)
What Was Analyzed
The security assessment covers multiple analysis categories:
- Malware Detection: YARA rule matching against 2,400+ malware signatures
- Secret Detection: Scanning for exposed API keys, tokens, and credentials
- Static Analysis: Code-level security analysis for common vulnerability patterns
- Network Analysis: Detection of suspicious network communications and endpoints
- Obfuscation Detection: Identification of code obfuscation techniques
Developer Information
Rotten Tomato Destroyer is published by Blife on the Firefox Add-ons marketplace. The extension has approximately 61 users.
Recommendation
Exercise caution with this extension. Review the detailed findings and ensure the requested permissions align with the extension's stated functionality before installation.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace