Is "新闻联播" on Chrome Web Store Safe to Install?

[email protected] · chrome · v1.0.1

新闻联播浏览器扩展(crx_xwlb) ### 1.1 背景 CCTV 新闻联播每日播出,但在浏览器端缺少便捷的阅读入口。本扩展基于 CCTV 公开 API,为用户提供可按日期检索、支持音频收听、目录速览与全文阅读的新闻联播浏览体验。 ### 1.2 目标 - 点击浏览器工具栏图标,在新标签页中打开完整功能页面 - 支持按日期筛选历史播出内容 - 支持在线收听当日音频 - 支持目录摘要与全文内容两种浏览模式 ### 1.3 用户群体 希望快速了解当日或历史新闻联播内容的 Chrome 用户。

Risk Assessment

Analyzed
63.18
out of 100
MEDIUM

191 security findings detected across all analyzers

Chrome extension requesting 4 permissions

Severity Breakdown

0
Critical
0
High
179
Medium
12
Low
0
Info

Finding Categories

3
Network
173
IoC Indicators

YARA Rules Matched

9 rules(12 hits)
credential env files postinstall crypto operations postinstall obfuscation postinstall file manipulation postinstall network communication NoUseWeakRandom postinstall system command postinstall file download OriginsNotVerified

Requested Permissions

4 permissions
https://api.cntv.cn/*
Low
https://vdn.apps.cntv.cn/*
Low
https://tv.cctv.com/*
Low
https://newcntv.qcloudcdn.com/*
Low

About This Extension

新闻联播浏览器扩展(crx_xwlb) ### 1.1 背景 CCTV 新闻联播每日播出,但在浏览器端缺少便捷的阅读入口。本扩展基于 CCTV 公开 API,为用户提供可按日期检索、支持音频收听、目录速览与全文阅读的新闻联播浏览体验。 ### 1.2 目标 - 点击浏览器工具栏图标,在新标签页中打开完整功能页面 - 支持按日期筛选历史播出内容 - 支持在线收听当日音频 - 支持目录摘要与全文内容两种浏览模式 ### 1.3 用户群体 希望快速了解当日或历史新闻联播内容的 Chrome 用户。

Detailed Findings

15 total

YARA Rule Matches

9 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
16
IP Addresses
4
Domains
152
Strings
173

All Indicators · 173

Domain
detected Domain: r.map

XIOC detected Domain: r.map

extracted_from_files

Domain
detected Domain: s.next

XIOC detected Domain: s.next

extracted_from_files

Domain
detected Domain: p.audio

XIOC detected Domain: p.audio

extracted_from_files

Domain
detected Domain: k.call

XIOC detected Domain: k.call

extracted_from_files

Domain
detected Domain: o.next

XIOC detected Domain: o.next

extracted_from_files

Domain
detected Domain: n.next

XIOC detected Domain: n.next

extracted_from_files

Domain
detected Domain: pr.next

XIOC detected Domain: pr.next

extracted_from_files

Domain
detected Domain: reactjs.org

XIOC detected Domain: reactjs.org

extracted_from_files

IP
detected IP: 4::

XIOC detected IP: 4::

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

IP
detected IP: ::af

XIOC detected IP: ::af

extracted_from_files

IP
detected IP: ::bef

XIOC detected IP: ::bef

extracted_from_files

URL
detected URL: http://www.w3.org/2000/svg'

XIOC detected URL: http://www.w3.org/2000/svg'

extracted_from_files

URL
detected URL: https://clients2.google.com/service/update2/crx

XIOC detected URL: https://clients2.google.com/service/update2/crx

extracted_from_files

URL
detected URL: https://api.cntv.cn/*

XIOC detected URL: https://api.cntv.cn/*

extracted_from_files

URL
detected URL: https://vdn.apps.cntv.cn/*

XIOC detected URL: https://vdn.apps.cntv.cn/*

extracted_from_files

URL
detected URL: https://tv.cctv.com/*

XIOC detected URL: https://tv.cctv.com/*

extracted_from_files

URL
detected URL: https://newcntv.qcloudcdn.com/*

XIOC detected URL: https://newcntv.qcloudcdn.com/*

extracted_from_files

Hash
detected MD5 Hash: EA0FDB8883ACBB2003999DF02BCFDE34

XIOC detected MD5 Hash: EA0FDB8883ACBB2003999DF02BCFDE34

extracted_from_files

URL
detected URL: http://www.w3.org/2000/svg

XIOC detected URL: http://www.w3.org/2000/svg

extracted_from_files

URL
detected URL: http://www.w3.org/1999/xhtml

XIOC detected URL: http://www.w3.org/1999/xhtml

extracted_from_files

URL
detected URL: https://reactrouter.com/v6/upgrading/future#v7_starttransition

XIOC detected URL: https://reactrouter.com/v6/upgrading/future#v7_starttransition

extracted_from_files

URL
detected URL: https://reactrouter.com/v6/upgrading/future#v7_relativesplatpath

XIOC detected URL: https://reactrouter.com/v6/upgrading/future#v7_relativesplatpath

extracted_from_files

URL
detected URL: http://jedwatson.github.io/classnames

XIOC detected URL: http://jedwatson.github.io/classnames

extracted_from_files

URL
detected URL: http://localhost

XIOC detected URL: http://localhost

extracted_from_files

URL
detected URL: https://api.cntv.cn

XIOC detected URL: https://api.cntv.cn

extracted_from_files

Domain
detected Domain: newcntv.qcloudcdn.com

XIOC detected Domain: newcntv.qcloudcdn.com

extracted_from_files

URL
detected URL: https://reactjs.org/docs/error-decoder.html?invariant=

XIOC detected URL: https://reactjs.org/docs/error-decoder.html?invariant=

extracted_from_files

URL
detected URL: http://www.w3.org/1999/xlink

XIOC detected URL: http://www.w3.org/1999/xlink

extracted_from_files

URL
detected URL: http://www.w3.org/XML/1998/namespace

XIOC detected URL: http://www.w3.org/XML/1998/namespace

extracted_from_files

Domain
detected Domain: g.data

XIOC detected Domain: g.data

extracted_from_files

Domain
detected Domain: y.video

XIOC detected Domain: y.video

extracted_from_files

Domain
detected Domain: h.id

XIOC detected Domain: h.id

extracted_from_files

Domain
detected Domain: v.video

XIOC detected Domain: v.video

extracted_from_files

Domain
detected Domain: f.data

XIOC detected Domain: f.data

extracted_from_files

Domain
detected Domain: o.ls

XIOC detected Domain: o.ls

extracted_from_files

Domain
detected Domain: clients2.google.com

XIOC detected Domain: clients2.google.com

extracted_from_files

Domain
detected Domain: s.data

XIOC detected Domain: s.data

extracted_from_files

Domain
detected Domain: yk.map

XIOC detected Domain: yk.map

extracted_from_files

Domain
detected Domain: y.map

XIOC detected Domain: y.map

extracted_from_files

Domain
detected Domain: d.date

XIOC detected Domain: d.date

extracted_from_files

Domain
detected Domain: a.call

XIOC detected Domain: a.call

extracted_from_files

Domain
detected Domain: i.map

XIOC detected Domain: i.map

extracted_from_files

Domain
detected Domain: r.response.data

XIOC detected Domain: r.response.data

extracted_from_files

Domain
detected Domain: a.dependencies.map

XIOC detected Domain: a.dependencies.map

extracted_from_files

Domain
detected Domain: e.id-o.id

XIOC detected Domain: e.id-o.id

extracted_from_files

Domain
detected Domain: ph.call

XIOC detected Domain: ph.call

extracted_from_files

Domain
detected Domain: api.cntv.cn

XIOC detected Domain: api.cntv.cn

extracted_from_files

Domain
detected Domain: vdn.apps.cntv.cn

XIOC detected Domain: vdn.apps.cntv.cn

extracted_from_files

Domain
detected Domain: tv.cctv.com

XIOC detected Domain: tv.cctv.com

extracted_from_files

Domain
detected Domain: gethttpvideoinfo.do

XIOC detected Domain: gethttpvideoinfo.do

extracted_from_files

Domain
detected Domain: e.host

XIOC detected Domain: e.host

extracted_from_files

Domain
detected Domain: n.host

XIOC detected Domain: n.host

extracted_from_files

Domain
detected Domain: b.merge.call

XIOC detected Domain: b.merge.call

extracted_from_files

Domain
detected Domain: xk.read

XIOC detected Domain: xk.read

extracted_from_files

Domain
detected Domain: s.open

XIOC detected Domain: s.open

extracted_from_files

Domain
detected Domain: t.read

XIOC detected Domain: t.read

extracted_from_files

Domain
detected Domain: h.name

XIOC detected Domain: h.name

extracted_from_files

Domain
detected Domain: y.call

XIOC detected Domain: y.call

extracted_from_files

Domain
detected Domain: l.name

XIOC detected Domain: l.name

extracted_from_files

Domain
detected Domain: pairs.map

XIOC detected Domain: pairs.map

extracted_from_files

Domain
detected Domain: s.name

XIOC detected Domain: s.name

extracted_from_files

Domain
detected Domain: r.call

XIOC detected Domain: r.call

extracted_from_files

Domain
detected Domain: r.data

XIOC detected Domain: r.data

extracted_from_files

Domain
detected Domain: i.total

XIOC detected Domain: i.total

extracted_from_files

Domain
detected Domain: j.date

XIOC detected Domain: j.date

extracted_from_files

Domain
detected Domain: ee.date

XIOC detected Domain: ee.date

extracted_from_files

Domain
detected Domain: n.ls

XIOC detected Domain: n.ls

extracted_from_files

Domain
detected Domain: j.call

XIOC detected Domain: j.call

extracted_from_files

Domain
detected Domain: d.style

XIOC detected Domain: d.style

extracted_from_files

Domain
detected Domain: a2.map

XIOC detected Domain: a2.map

extracted_from_files

Domain
detected Domain: error.call

XIOC detected Domain: error.call

extracted_from_files

Domain
detected Domain: xe.style

XIOC detected Domain: xe.style

extracted_from_files

Domain
detected Domain: ut.call

XIOC detected Domain: ut.call

extracted_from_files

Domain
detected Domain: e.map

XIOC detected Domain: e.map

extracted_from_files

Domain
detected Domain: f.keyentities.map

XIOC detected Domain: f.keyentities.map

extracted_from_files

Domain
detected Domain: r.date

XIOC detected Domain: r.date

extracted_from_files

Domain
detected Domain: t.date

XIOC detected Domain: t.date

extracted_from_files

Domain
detected Domain: r.name

XIOC detected Domain: r.name

extracted_from_files

Domain
detected Domain: this.style

XIOC detected Domain: this.style

extracted_from_files

Domain
detected Domain: c.map

XIOC detected Domain: c.map

extracted_from_files

Domain
detected Domain: t.map

XIOC detected Domain: t.map

extracted_from_files

Domain
detected Domain: ha.pink

XIOC detected Domain: ha.pink

extracted_from_files

Domain
detected Domain: ma.pink

XIOC detected Domain: ma.pink

extracted_from_files

Domain
detected Domain: jedwatson.github.io

XIOC detected Domain: jedwatson.github.io

extracted_from_files

Domain
detected Domain: y.data

XIOC detected Domain: y.data

extracted_from_files

Domain
detected Domain: r.id

XIOC detected Domain: r.id

extracted_from_files

Domain
detected Domain: e.style.top

XIOC detected Domain: e.style.top

extracted_from_files

Domain
detected Domain: h.style

XIOC detected Domain: h.style

extracted_from_files

Domain
detected Domain: reactrouter.com

XIOC detected Domain: reactrouter.com

extracted_from_files

Domain
detected Domain: 32.mp

XIOC detected Domain: 32.mp

extracted_from_files

Domain
detected Domain: www.w3.org

XIOC detected Domain: www.w3.org

extracted_from_files

Domain
detected Domain: this.name

XIOC detected Domain: this.name

extracted_from_files

Domain
detected Domain: tostring.call

XIOC detected Domain: tostring.call

extracted_from_files

Domain
detected Domain: e.constructor.name

XIOC detected Domain: e.constructor.name

extracted_from_files

Domain
detected Domain: propertyisenumerable.call

XIOC detected Domain: propertyisenumerable.call

extracted_from_files

Domain
detected Domain: a.map

XIOC detected Domain: a.map

extracted_from_files

Domain
detected Domain: f.map

XIOC detected Domain: f.map

extracted_from_files

Domain
detected Domain: o.map

XIOC detected Domain: o.map

extracted_from_files

Domain
detected Domain: this.id

XIOC detected Domain: this.id

extracted_from_files

Domain
detected Domain: g.map

XIOC detected Domain: g.map

extracted_from_files

Domain
detected Domain: n.route.id

XIOC detected Domain: n.route.id

extracted_from_files

Domain
detected Domain: f.route.id

XIOC detected Domain: f.route.id

extracted_from_files

Domain
detected Domain: r.props.id

XIOC detected Domain: r.props.id

extracted_from_files

Domain
detected Domain: hasownproperty.call

XIOC detected Domain: hasownproperty.call

extracted_from_files

Domain
detected Domain: n.call

XIOC detected Domain: n.call

extracted_from_files

Domain
detected Domain: boolean.prototype.valueof.call

XIOC detected Domain: boolean.prototype.valueof.call

extracted_from_files

Domain
detected Domain: h.search

XIOC detected Domain: h.search

extracted_from_files

Domain
detected Domain: l.map

XIOC detected Domain: l.map

extracted_from_files

Domain
detected Domain: s.map

XIOC detected Domain: s.map

extracted_from_files

Domain
detected Domain: t.routesmeta.map

XIOC detected Domain: t.routesmeta.map

extracted_from_files

Domain
detected Domain: n.routesmeta.map

XIOC detected Domain: n.routesmeta.map

extracted_from_files

Domain
detected Domain: n.map

XIOC detected Domain: n.map

extracted_from_files

Domain
detected Domain: o.search

XIOC detected Domain: o.search

extracted_from_files

Domain
detected Domain: o.style

XIOC detected Domain: o.style

extracted_from_files

Domain
detected Domain: f.memoizedprops.style

XIOC detected Domain: f.memoizedprops.style

extracted_from_files

Domain
detected Domain: s.call

XIOC detected Domain: s.call

extracted_from_files

Domain
detected Domain: n.name

XIOC detected Domain: n.name

extracted_from_files

Domain
detected Domain: license.md

XIOC detected Domain: license.md

extracted_from_files

Domain
detected Domain: t.search

XIOC detected Domain: t.search

extracted_from_files

Domain
detected Domain: c.name

XIOC detected Domain: c.name

extracted_from_files

Domain
detected Domain: ke.next

XIOC detected Domain: ke.next

extracted_from_files

Domain
detected Domain: u.next

XIOC detected Domain: u.next

extracted_from_files

Domain
detected Domain: n.compare

XIOC detected Domain: n.compare

extracted_from_files

Domain
detected Domain: e.id

XIOC detected Domain: e.id

extracted_from_files

Domain
detected Domain: r.is

XIOC detected Domain: r.is

extracted_from_files

Domain
detected Domain: r.next

XIOC detected Domain: r.next

extracted_from_files

Domain
detected Domain: object.prototype.hasownproperty.call

XIOC detected Domain: object.prototype.hasownproperty.call

extracted_from_files

Domain
detected Domain: ch.call

XIOC detected Domain: ch.call

extracted_from_files

Domain
detected Domain: a.name

XIOC detected Domain: a.name

extracted_from_files

Domain
detected Domain: c.next

XIOC detected Domain: c.next

extracted_from_files

Domain
detected Domain: g.call

XIOC detected Domain: g.call

extracted_from_files

Domain
detected Domain: p.next

XIOC detected Domain: p.next

extracted_from_files

Domain
detected Domain: n.data

XIOC detected Domain: n.data

extracted_from_files

Domain
detected Domain: ye.next

XIOC detected Domain: ye.next

extracted_from_files

Domain
detected Domain: m.next

XIOC detected Domain: m.next

extracted_from_files

Domain
detected Domain: ly.call

XIOC detected Domain: ly.call

extracted_from_files

Domain
detected Domain: t.call

XIOC detected Domain: t.call

extracted_from_files

Domain
detected Domain: e.next

XIOC detected Domain: e.next

extracted_from_files

Domain
detected Domain: t.next

XIOC detected Domain: t.next

extracted_from_files

Domain
detected Domain: i.next

XIOC detected Domain: i.next

extracted_from_files

Domain
detected Domain: a.next

XIOC detected Domain: a.next

extracted_from_files

Domain
detected Domain: p.target

XIOC detected Domain: p.target

extracted_from_files

Domain
detected Domain: y.target

XIOC detected Domain: y.target

extracted_from_files

Domain
detected Domain: p.data

XIOC detected Domain: p.data

extracted_from_files

Domain
detected Domain: c.data

XIOC detected Domain: c.data

extracted_from_files

Domain
detected Domain: o.data

XIOC detected Domain: o.data

extracted_from_files

Domain
detected Domain: object.prototype.tostring.call

XIOC detected Domain: object.prototype.tostring.call

extracted_from_files

Domain
detected Domain: c.call

XIOC detected Domain: c.call

extracted_from_files

Domain
detected Domain: this.target

XIOC detected Domain: this.target

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: e.data

XIOC detected Domain: e.data

extracted_from_files

Domain
detected Domain: t.data

XIOC detected Domain: t.data

extracted_from_files

Domain
detected Domain: object.is

XIOC detected Domain: object.is

extracted_from_files

Domain
detected Domain: e.top

XIOC detected Domain: e.top

extracted_from_files

Domain
detected Domain: t.target

XIOC detected Domain: t.target

extracted_from_files

Domain
detected Domain: o.call

XIOC detected Domain: o.call

extracted_from_files

Domain
detected Domain: i.call

XIOC detected Domain: i.call

extracted_from_files

Domain
detected Domain: e.style

XIOC detected Domain: e.style

extracted_from_files

Domain
detected Domain: t.style

XIOC detected Domain: t.style

extracted_from_files

Domain
detected Domain: t.is

XIOC detected Domain: t.is

extracted_from_files

Domain
detected Domain: e.target

XIOC detected Domain: e.target

extracted_from_files

Domain
detected Domain: array.prototype.slice.call

XIOC detected Domain: array.prototype.slice.call

extracted_from_files

Domain
detected Domain: performance.now

XIOC detected Domain: performance.now

extracted_from_files

Domain
detected Domain: i.now

XIOC detected Domain: i.now

extracted_from_files

Domain
detected Domain: l.now

XIOC detected Domain: l.now

extracted_from_files

Domain
detected Domain: ta.call

XIOC detected Domain: ta.call

extracted_from_files

Domain
detected Domain: e.call

XIOC detected Domain: e.call

extracted_from_files

Domain
detected Domain: e.name

XIOC detected Domain: e.name

extracted_from_files

Domain
detected Domain: t.name

XIOC detected Domain: t.name

extracted_from_files

Domain
detected Domain: i.name

XIOC detected Domain: i.name

extracted_from_files

Domain
detected Domain: l.next

XIOC detected Domain: l.next

extracted_from_files

Domain
detected Domain: object.prototype.propertyisenumerable.call

XIOC detected Domain: object.prototype.propertyisenumerable.call

extracted_from_files

Security Analysis Summary

Security Analysis Overview

新闻联播 is a Chrome Web Store extension published by [email protected]. Version 1.0.1 has been analyzed by the Risky Plugins security platform, receiving a risk score of 63.18/100 (MEDIUM risk) based on 191 security findings.

Risk Assessment

This extension presents high security risk. Significant concerns were identified during analysis. It is not recommended for use in sensitive or production environments without thorough review.

Findings Breakdown

  • Medium: 179 finding(s)
  • Low: 12 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

新闻联播 is published by [email protected] on the Chrome Web Store marketplace.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions