Is "Clipboard History Manager" on Microsoft Edge Add-ons Safe to Install?

Bermet · edge · v0.3.0

This extension only works on Linux, Windows, and Mac OS at this moment. A powerful clipboard manager with a searchable database that can store hundreds of items without any performance drawbacks.

Risk Assessment

Analyzed
100
out of 100
CRITICAL

191 security findings detected across all analyzers

Severity Breakdown

0
Critical
43
High
124
Medium
0
Low
0
Info

Finding Categories

43
Malware Signatures
4
Network
120
IoC Indicators

YARA Rules Matched

7 rules(43 hits)
postinstall file manipulation postinstall network communication postinstall obfuscation postinstall file download postinstall system command NoUseWeakRandom postinstall crypto operations

Detailed Findings

71 total

YARA Rule Matches

7 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
21
IP Addresses
30
Domains
79
Strings
120

All Indicators · 120

Domain
detected Domain: a.ga

XIOC detected Domain: a.ga

extracted_from_files

Domain
detected Domain: self.pid

XIOC detected Domain: self.pid

extracted_from_files

URL
detected URL: https://opensource.org/licenses/MIT

XIOC detected URL: https://opensource.org/licenses/MIT

extracted_from_files

URL
detected URL: http://pajhome.org.uk/crypt/md5

XIOC detected URL: http://pajhome.org.uk/crypt/md5

extracted_from_files

URL
detected URL: https://github.com/lunu-bounir/xapain.js/releases/tag/0.2.8

XIOC detected URL: https://github.com/lunu-bounir/xapain.js/releases/tag/0.2.8

extracted_from_files

URL
detected URL: https://github.com/lunu-bounir/xapain.js/blob/master/xapian.cc

XIOC detected URL: https://github.com/lunu-bounir/xapain.js/blob/master/xapian.cc

extracted_from_files

URL
detected URL: https://github.com/lunu-bounir/xapain.js/blob/master/.travis.yml

XIOC detected URL: https://github.com/lunu-bounir/xapain.js/blob/master/.travis.yml

extracted_from_files

URL
detected URL: https://travis-ci.org/github/lunu-bounir/xapain.js/builds/695368634

XIOC detected URL: https://travis-ci.org/github/lunu-bounir/xapain.js/builds/695368634

extracted_from_files

Hash
detected SHA1 Hash: e1346d5944bf0c06677ab992c1587c4be702ac80

XIOC detected SHA1 Hash: e1346d5944bf0c06677ab992c1587c4be702ac80

extracted_from_files

URL
detected URL: https://api.github.com/repos/lunu-bounir/clipboard-helper/releases/latest').then(r

XIOC detected URL: https://api.github.com/repos/lunu-bounir/clipboard-helper/releases/latest').then(r

extracted_from_files

URL
detected URL: http://example.com

XIOC detected URL: http://example.com

extracted_from_files

URL
detected URL: http://creativecommons.org/ns#

XIOC detected URL: http://creativecommons.org/ns#

extracted_from_files

URL
detected URL: https://add0n.com/clipboard-manager.html

XIOC detected URL: https://add0n.com/clipboard-manager.html

extracted_from_files

URL
detected URL: https://edge.microsoft.com/extensionwebstorebase/v1/crx

XIOC detected URL: https://edge.microsoft.com/extensionwebstorebase/v1/crx

extracted_from_files

URL
detected URL: https://github.com/blueimp/JavaScript-MD5

XIOC detected URL: https://github.com/blueimp/JavaScript-MD5

extracted_from_files

URL
detected URL: https://blueimp.net

XIOC detected URL: https://blueimp.net

extracted_from_files

URL
detected URL: https://raw.githubusercontent.com/blueimp/JavaScript-MD5/e1346d5944bf0c06677ab992c1587c4be702ac80/js/md5.js

XIOC detected URL: https://raw.githubusercontent.com/blueimp/JavaScript-MD5/e1346d5944bf0c06677ab992c1587c4be702ac80/js/md5.js

extracted_from_files

URL
detected URL: https://github.com/lunu-bounir/clipboard-helper/

XIOC detected URL: https://github.com/lunu-bounir/clipboard-helper/

extracted_from_files

URL
detected URL: https://travis-ci.org/lunu-bounir/clipboard-helper

XIOC detected URL: https://travis-ci.org/lunu-bounir/clipboard-helper

extracted_from_files

URL
detected URL: https://www.youtube.com/watch?v=jbkjxphZrFY

XIOC detected URL: https://www.youtube.com/watch?v=jbkjxphZrFY

extracted_from_files

URL
detected URL: https://www.youtube.com/watch?v=dtEAhArXOrg

XIOC detected URL: https://www.youtube.com/watch?v=dtEAhArXOrg

extracted_from_files

URL
detected URL: https://github.com/lunu-bounir/clipboard-helper/releases/download/0.1.4/windows.zip',

XIOC detected URL: https://github.com/lunu-bounir/clipboard-helper/releases/download/0.1.4/windows.zip',

extracted_from_files

URL
detected URL: https://github.com/lunu-bounir/clipboard-helper/releases/download/0.1.4/mac.zip'

XIOC detected URL: https://github.com/lunu-bounir/clipboard-helper/releases/download/0.1.4/mac.zip'

extracted_from_files

Domain
detected Domain: date.tm

XIOC detected Domain: date.tm

extracted_from_files

Domain
detected Domain: this.id

XIOC detected Domain: this.id

extracted_from_files

Domain
detected Domain: this.name

XIOC detected Domain: this.name

extracted_from_files

Domain
detected Domain: this.stream

XIOC detected Domain: this.stream

extracted_from_files

IP
detected IP: ::c

XIOC detected IP: ::c

extracted_from_files

Domain
detected Domain: xapian.config.object.store

XIOC detected Domain: xapian.config.object.store

extracted_from_files

Domain
detected Domain: xapian.storage

XIOC detected Domain: xapian.storage

extracted_from_files

Domain
detected Domain: manager.select

XIOC detected Domain: manager.select

extracted_from_files

Domain
detected Domain: fs.open

XIOC detected Domain: fs.open

extracted_from_files

Domain
detected Domain: fs.read

XIOC detected Domain: fs.read

extracted_from_files

Domain
detected Domain: ret.name

XIOC detected Domain: ret.name

extracted_from_files

Domain
detected Domain: lookup.node.name

XIOC detected Domain: lookup.node.name

extracted_from_files

Domain
detected Domain: obj.link

XIOC detected Domain: obj.link

extracted_from_files

Domain
detected Domain: stat.dev

XIOC detected Domain: stat.dev

extracted_from_files

Domain
detected Domain: node.link

XIOC detected Domain: node.link

extracted_from_files

Domain
detected Domain: node.parent.id

XIOC detected Domain: node.parent.id

extracted_from_files

Domain
detected Domain: current.name

XIOC detected Domain: current.name

extracted_from_files

Domain
detected Domain: parent.id

XIOC detected Domain: parent.id

extracted_from_files

Domain
detected Domain: stream.stream

XIOC detected Domain: stream.stream

extracted_from_files

Domain
detected Domain: device.stream

XIOC detected Domain: device.stream

extracted_from_files

Domain
detected Domain: ops.open

XIOC detected Domain: ops.open

extracted_from_files

Domain
detected Domain: table.dir.stream

XIOC detected Domain: table.dir.stream

extracted_from_files

Domain
detected Domain: table.file.stream

XIOC detected Domain: table.file.stream

extracted_from_files

Domain
detected Domain: table.link.stream

XIOC detected Domain: table.link.stream

extracted_from_files

Domain
detected Domain: table.chrdev.stream

XIOC detected Domain: table.chrdev.stream

extracted_from_files

Domain
detected Domain: attr.dev

XIOC detected Domain: attr.dev

extracted_from_files

Domain
detected Domain: node.id

XIOC detected Domain: node.id

extracted_from_files

Domain
detected Domain: node.name

XIOC detected Domain: node.name

extracted_from_files

Domain
detected Domain: xapian.cc

XIOC detected Domain: xapian.cc

extracted_from_files

Domain
detected Domain: xhr.open

XIOC detected Domain: xhr.open

extracted_from_files

Domain
detected Domain: array.prototype.slice.call

XIOC detected Domain: array.prototype.slice.call

extracted_from_files

Domain
detected Domain: tty.stream

XIOC detected Domain: tty.stream

extracted_from_files

Domain
detected Domain: memfs.stream

XIOC detected Domain: memfs.stream

extracted_from_files

Domain
detected Domain: ops.read

XIOC detected Domain: ops.read

extracted_from_files

Domain
detected Domain: node.stream

XIOC detected Domain: node.stream

extracted_from_files

Domain
detected Domain: console.info

XIOC detected Domain: console.info

extracted_from_files

Domain
detected Domain: sender.tab

XIOC detected Domain: sender.tab

extracted_from_files

Domain
detected Domain: xapian.search

XIOC detected Domain: xapian.search

extracted_from_files

Domain
detected Domain: manager.jobs

XIOC detected Domain: manager.jobs

extracted_from_files

Domain
detected Domain: win.id

XIOC detected Domain: win.id

extracted_from_files

Domain
detected Domain: prefs.top

XIOC detected Domain: prefs.top

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: indexeddb.open

XIOC detected Domain: indexeddb.open

extracted_from_files

Domain
detected Domain: add0n.com

XIOC detected Domain: add0n.com

extracted_from_files

Domain
detected Domain: blueimp.net

XIOC detected Domain: blueimp.net

extracted_from_files

Domain
detected Domain: opensource.org

XIOC detected Domain: opensource.org

extracted_from_files

Domain
detected Domain: pajhome.org.uk

XIOC detected Domain: pajhome.org.uk

extracted_from_files

Domain
detected Domain: monitor.id

XIOC detected Domain: monitor.id

extracted_from_files

Domain
detected Domain: win.top

XIOC detected Domain: win.top

extracted_from_files

Domain
detected Domain: manager.select.next

XIOC detected Domain: manager.select.next

extracted_from_files

Domain
detected Domain: creativecommons.org

XIOC detected Domain: creativecommons.org

extracted_from_files

URL
detected Domain: purl.org

XIOC detected Domain: purl.org

extracted_from_files

Domain
detected Domain: toast.display.id

XIOC detected Domain: toast.display.id

extracted_from_files

Domain
detected Domain: a.download

XIOC detected Domain: a.download

extracted_from_files

Domain
detected Domain: a.click

XIOC detected Domain: a.click

extracted_from_files

Domain
detected Domain: file.click

XIOC detected Domain: file.click

extracted_from_files

Domain
detected Domain: request.pid

XIOC detected Domain: request.pid

extracted_from_files

Domain
detected Domain: manager.observer

XIOC detected Domain: manager.observer

extracted_from_files

Domain
detected Domain: e.target

XIOC detected Domain: e.target

extracted_from_files

Domain
detected Domain: manager.observer.id

XIOC detected Domain: manager.observer.id

extracted_from_files

Domain
detected Domain: object.date

XIOC detected Domain: object.date

extracted_from_files

Domain
detected Domain: tr.dataset.id

XIOC detected Domain: tr.dataset.id

extracted_from_files

Domain
detected Domain: object.id

XIOC detected Domain: object.id

extracted_from_files

IP
detected Domain: mac.zip

XIOC detected Domain: mac.zip

extracted_from_files

Domain
detected Domain: config.link

XIOC detected Domain: config.link

extracted_from_files

Domain
detected Domain: a.name

XIOC detected Domain: a.name

extracted_from_files

Domain
detected Domain: location.search

XIOC detected Domain: location.search

extracted_from_files

IP
detected IP: c::

XIOC detected IP: c::

extracted_from_files

Domain
detected Domain: fs.tracking.openflags.read

XIOC detected Domain: fs.tracking.openflags.read

extracted_from_files

Domain
detected Domain: manager.search

XIOC detected Domain: manager.search

extracted_from_files

Domain
detected Domain: github.com

XIOC detected Domain: github.com

extracted_from_files

Domain
detected Domain: travis-ci.org

XIOC detected Domain: travis-ci.org

extracted_from_files

Domain
detected Domain: www.youtube.com

XIOC detected Domain: www.youtube.com

extracted_from_files

Domain
detected Domain: install.sh

XIOC detected Domain: install.sh

extracted_from_files

Domain
detected Domain: uninstall.sh

XIOC detected Domain: uninstall.sh

extracted_from_files

Domain
detected Domain: api.github.com

XIOC detected Domain: api.github.com

extracted_from_files

IP
detected Domain: windows.zip

XIOC detected Domain: windows.zip

extracted_from_files

IP
detected IP: ::e

XIOC detected IP: ::e

extracted_from_files

IP
detected IP: 89::

XIOC detected IP: 89::

extracted_from_files

IP
detected IP: e::c

XIOC detected IP: e::c

extracted_from_files

IP
detected IP: d::e

XIOC detected IP: d::e

extracted_from_files

IP
detected IP: d::bad

XIOC detected IP: d::bad

extracted_from_files

Domain
detected Domain: ns.adobe.com

XIOC detected Domain: ns.adobe.com

extracted_from_files

Domain
detected Domain: v.lc

XIOC detected Domain: v.lc

extracted_from_files

IP
detected IP: ::b

XIOC detected IP: ::b

extracted_from_files

IP
detected IP: ::d

XIOC detected IP: ::d

extracted_from_files

IP
detected IP: ::bb2

XIOC detected IP: ::bb2

extracted_from_files

IP
detected IP: e::

XIOC detected IP: e::

extracted_from_files

IP
detected IP: ::da

XIOC detected IP: ::da

extracted_from_files

IP
detected IP: ::f

XIOC detected IP: ::f

extracted_from_files

IP
detected IP: ::db

XIOC detected IP: ::db

extracted_from_files

IP
detected IP: f1::

XIOC detected IP: f1::

extracted_from_files

IP
detected IP: 0::

XIOC detected IP: 0::

extracted_from_files

IP
detected IP: ::bef

XIOC detected IP: ::bef

extracted_from_files

IP
detected IP: ::a

XIOC detected IP: ::a

extracted_from_files

IP
detected IP: ::dec

XIOC detected IP: ::dec

extracted_from_files

IP
detected IP: ::4

XIOC detected IP: ::4

extracted_from_files

Security Analysis Summary

Security Analysis Overview

Clipboard History Manager is a edge extension published by Bermet. Version 0.3.0 has been analyzed by the Risky Plugins security platform, receiving a risk score of 100/100 (CRITICAL risk) based on 191 security findings.

Risk Assessment

This extension presents critical security risk. Severe issues were detected, potentially including malware indicators, exposed secrets, or dangerous behaviors. Installation is strongly discouraged until these issues are addressed.

Findings Breakdown

  • High: 43 finding(s)
  • Medium: 124 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

Clipboard History Manager is published by Bermet on the edge marketplace.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions