Is "TextEase - Text Shortcuts & Smart AI Prompts Expander" on Chrome Web Store Safe to Install?

[email protected] · chrome · v2.1

TextEase — Type Less, Do More. Transform your typing into pure productivity! TextEase is an advanced text expander that turns shortcuts into smart templates — letting you type faster, automate repetitive text, and even interact with expansions in real time. Why you’ll love TextEase: 🪄 Interactive Expansions: Use {input} placeholders for step-by-step text filling. Specially designed for AI era to save and expand prompts. ⚡ Instant Slash & Tab Triggers: Expand snippets using /shortcut or the Tab key. 🧠 Smart Suggestions: See live visual hints and quick expansion previews as you type. ☁️ Google Sync: Securely back up and sync your snippets using your Google account. 📋 Dynamic Variables: Insert {date}, {time}, {datetime}, or {clipboard} instantly. 💾 Backup & Restore: Export or import all your saved expansions in one click. 🎨 Sleek & Minimal UI: A beautiful and intuitive interface that keeps you focused. TextEase isn’t just a text expander — it’s your personal typing automation companion, designed to save time, reduce effort, and boost your writing efficiency everywhere you type.

Risk Assessment

Analyzed
55.55
out of 100
MEDIUM

114 security findings detected across all analyzers

Chrome extension requesting 5 permissions

Severity Breakdown

0
Critical
33
High
81
Medium
0
Low
0
Info

Finding Categories

33
Malware Signatures
2
Network
78
IoC Indicators

YARA Rules Matched

8 rules(33 hits)
postinstall file download postinstall system command postinstall file manipulation postinstall crypto operations postinstall network communication postinstall persistence mechanism postinstall obfuscation NoUseWeakRandom

Requested Permissions

5 permissions
clipboardRead

Read data from your clipboard

High
identity

Access your identity and sign-in tokens

High
activeTab
Medium
storage
Low
scripting
Low

About This Extension

TextEase — Type Less, Do More. Transform your typing into pure productivity! TextEase is an advanced text expander that turns shortcuts into smart templates — letting you type faster, automate repetitive text, and even interact with expansions in real time. Why you’ll love TextEase: 🪄 Interactive Expansions: Use {input} placeholders for step-by-step text filling. Specially designed for AI era to save and expand prompts. ⚡ Instant Slash & Tab Triggers: Expand snippets using /shortcut or the Tab key. 🧠 Smart Suggestions: See live visual hints and quick expansion previews as you type. ☁️ Google Sync: Securely back up and sync your snippets using your Google account. 📋 Dynamic Variables: Insert {date}, {time}, {datetime}, or {clipboard} instantly. 💾 Backup & Restore: Export or import all your saved expansions in one click. 🎨 Sleek & Minimal UI: A beautiful and intuitive interface that keeps you focused. TextEase isn’t just a text expander — it’s your personal typing automation companion, designed to save time, reduce effort, and boost your writing efficiency everywhere you type.

Detailed Findings

35 total

YARA Rule Matches

8 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
26
IP Addresses
11
Domains
41
Strings
78

All Indicators · 78

Domain
detected Domain: cdnjs.cloudflare.com

XIOC detected Domain: cdnjs.cloudflare.com

extracted_from_files

URL
detected URL: https://clients2.google.com/service/update2/crx

XIOC detected URL: https://clients2.google.com/service/update2/crx

extracted_from_files

Domain
detected Domain: e.top

XIOC detected Domain: e.top

extracted_from_files

URL
detected URL: https://www.googleapis.com/oauth2/v2/userinfo',

XIOC detected URL: https://www.googleapis.com/oauth2/v2/userinfo',

extracted_from_files

Domain
detected Domain: window.open

XIOC detected Domain: window.open

extracted_from_files

Domain
detected Domain: ko-fi.com

XIOC detected Domain: ko-fi.com

extracted_from_files

Domain
detected Domain: chromewebstore.google.com

XIOC detected Domain: chromewebstore.google.com

extracted_from_files

Domain
detected Domain: popup-overlay.show

XIOC detected Domain: popup-overlay.show

extracted_from_files

Domain
detected Domain: e.name

XIOC detected Domain: e.name

extracted_from_files

Domain
detected Domain: e.style.top

XIOC detected Domain: e.style.top

extracted_from_files

Domain
detected Domain: t.target.id

XIOC detected Domain: t.target.id

extracted_from_files

Domain
detected Domain: input.click

XIOC detected Domain: input.click

extracted_from_files

Domain
detected Domain: this.elements.importallfile.click

XIOC detected Domain: this.elements.importallfile.click

extracted_from_files

Domain
detected Domain: a.click

XIOC detected Domain: a.click

extracted_from_files

Domain
detected Domain: div.style

XIOC detected Domain: div.style

extracted_from_files

Domain
detected Domain: window.walkthroughinstance.show

XIOC detected Domain: window.walkthroughinstance.show

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: policies.google.com

XIOC detected Domain: policies.google.com

extracted_from_files

Domain
detected Domain: n.sv

XIOC detected Domain: n.sv

extracted_from_files

Domain
detected Domain: 9h.mm

XIOC detected Domain: 9h.mm

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

Domain
detected Domain: 5100866685-l210491godq8lg1gnab16ss2iagrh8qb.apps.googleusercontent.com

XIOC detected Domain: 5100866685-l210491godq8lg1gnab16ss2iagrh8qb.apps.googleusercontent.com

extracted_from_files

Domain
detected Domain: userinfo.email

XIOC detected Domain: userinfo.email

extracted_from_files

Domain
detected Domain: i.top

XIOC detected Domain: i.top

extracted_from_files

Domain
detected Domain: tab.id

XIOC detected Domain: tab.id

extracted_from_files

Domain
detected Domain: r.top-c.top

XIOC detected Domain: r.top-c.top

extracted_from_files

Domain
detected Domain: s.top

XIOC detected Domain: s.top

extracted_from_files

Domain
detected Domain: e.bh

XIOC detected Domain: e.bh

extracted_from_files

Domain
detected Domain: vר.co

XIOC detected Domain: vר.co

extracted_from_files

Domain
detected Domain: www.w3.org

XIOC detected Domain: www.w3.org

extracted_from_files

Domain
detected Domain: ns.adobe.com

XIOC detected Domain: ns.adobe.com

extracted_from_files

URL
detected Domain: purl.org

XIOC detected Domain: purl.org

extracted_from_files

Domain
detected Domain: www.googleapis.com

XIOC detected Domain: www.googleapis.com

extracted_from_files

Domain
detected Domain: t.id

XIOC detected Domain: t.id

extracted_from_files

Domain
detected Domain: t.target

XIOC detected Domain: t.target

extracted_from_files

Domain
detected Domain: this.suggestionpopup.style.top

XIOC detected Domain: this.suggestionpopup.style.top

extracted_from_files

Domain
detected Domain: t.map

XIOC detected Domain: t.map

extracted_from_files

Domain
detected Domain: i.style

XIOC detected Domain: i.style

extracted_from_files

Domain
detected Domain: a.top

XIOC detected Domain: a.top

extracted_from_files

IP
detected IP: ::f

XIOC detected IP: ::f

extracted_from_files

IP
detected IP: 8::d

XIOC detected IP: 8::d

extracted_from_files

IP
detected IP: ::8

XIOC detected IP: ::8

extracted_from_files

IP
detected IP: ::af

XIOC detected IP: ::af

extracted_from_files

IP
detected IP: ea::

XIOC detected IP: ea::

extracted_from_files

IP
detected IP: d::bef

XIOC detected IP: d::bef

extracted_from_files

IP
detected IP: ::bef

XIOC detected IP: ::bef

extracted_from_files

Domain
detected Domain: e.click

XIOC detected Domain: e.click

extracted_from_files

Domain
detected Domain: this.show

XIOC detected Domain: this.show

extracted_from_files

Domain
detected Domain: n.id

XIOC detected Domain: n.id

extracted_from_files

URL
detected URL: http://ns.adobe.com/xap/1.0/

XIOC detected URL: http://ns.adobe.com/xap/1.0/

extracted_from_files

URL
detected URL: http://purl.org/dc/elements/1.1/

XIOC detected URL: http://purl.org/dc/elements/1.1/

extracted_from_files

URL
detected URL: http://ns.adobe.com/xap/1.0/sType/ResourceRef#

XIOC detected URL: http://ns.adobe.com/xap/1.0/sType/ResourceRef#

extracted_from_files

URL
detected URL: http://ns.adobe.com/xap/1.0/sType/ResourceEvent#

XIOC detected URL: http://ns.adobe.com/xap/1.0/sType/ResourceEvent#

extracted_from_files

URL
detected URL: http://ns.adobe.com/xap/1.0/mm/

XIOC detected URL: http://ns.adobe.com/xap/1.0/mm/

extracted_from_files

URL
detected URL: http://www.w3.org/1999/02/22-rdf-syntax-ns#

XIOC detected URL: http://www.w3.org/1999/02/22-rdf-syntax-ns#

extracted_from_files

URL
detected URL: https://www.googleapis.com/drive/v3/files/$

XIOC detected URL: https://www.googleapis.com/drive/v3/files/$

extracted_from_files

URL
detected URL: https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.0.0-beta3/css/all.min.css

XIOC detected URL: https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.0.0-beta3/css/all.min.css

extracted_from_files

URL
detected URL: https://www.googleapis.com/auth/userinfo.profile

XIOC detected URL: https://www.googleapis.com/auth/userinfo.profile

extracted_from_files

URL
detected URL: https://www.googleapis.com/auth/userinfo.email

XIOC detected URL: https://www.googleapis.com/auth/userinfo.email

extracted_from_files

URL
detected URL: https://www.googleapis.com/auth/drive.appdata

XIOC detected URL: https://www.googleapis.com/auth/drive.appdata

extracted_from_files

Domain
detected Domain: this.next

XIOC detected Domain: this.next

extracted_from_files

URL
detected URL: http://ns.adobe.com/xap/1.0/sType/Dimensions#

XIOC detected URL: http://ns.adobe.com/xap/1.0/sType/Dimensions#

extracted_from_files

URL
detected URL: http://ns.adobe.com/xmp/1.0/DynamicMedia/

XIOC detected URL: http://ns.adobe.com/xmp/1.0/DynamicMedia/

extracted_from_files

URL
detected URL: https://www.googleapis.com/drive/v3/files?spaces=appDataFolder&q=name='$

XIOC detected URL: https://www.googleapis.com/drive/v3/files?spaces=appDataFolder&q=name='$

extracted_from_files

URL
detected URL: https://chromewebstore.google.com/detail/kijihfekpgbokbojefcgpojmfipklpjo?utm_source=item-share-cb',icon:'icons/3.png',description:'Your

XIOC detected URL: https://chromewebstore.google.com/detail/kijihfekpgbokbojefcgpojmfipklpjo?utm_source=item-share-cb',icon:'icons/3.png',description:'Your

extracted_from_files

URL
detected URL: https://chromewebstore.google.com/detail/eianiiieigdplanmjjlchcjpebdcggal?utm_source=item-share-cb',icon:'icons/2.png',description:'Take

XIOC detected URL: https://chromewebstore.google.com/detail/eianiiieigdplanmjjlchcjpebdcggal?utm_source=item-share-cb',icon:'icons/2.png',description:'Take

extracted_from_files

URL
detected URL: https://chromewebstore.google.com/detail/obamiledmoddmjgcenohkbbgemkoepib?utm_source=item-share-cb',icon:'icons/1.png',description:'Smart

XIOC detected URL: https://chromewebstore.google.com/detail/obamiledmoddmjgcenohkbbgemkoepib?utm_source=item-share-cb',icon:'icons/1.png',description:'Smart

extracted_from_files

URL
detected URL: https://chromewebstore.google.com/detail/greasepanda/aopmgjdppgdhejibmejbahdkhpklkdjf

XIOC detected URL: https://chromewebstore.google.com/detail/greasepanda/aopmgjdppgdhejibmejbahdkhpklkdjf

extracted_from_files

URL
detected URL: https://ko-fi.com/G2G11JQG1I

XIOC detected URL: https://ko-fi.com/G2G11JQG1I

extracted_from_files

URL
detected URL: https://policies.google.com/privacy

XIOC detected URL: https://policies.google.com/privacy

extracted_from_files

Hash
detected MD5 Hash: 2256219B045411EB8C98C90E7D920236

XIOC detected MD5 Hash: 2256219B045411EB8C98C90E7D920236

extracted_from_files

Hash
detected MD5 Hash: 2256219E045411EB8C98C90E7D920236

XIOC detected MD5 Hash: 2256219E045411EB8C98C90E7D920236

extracted_from_files

Hash
detected MD5 Hash: 2256219D045411EB8C98C90E7D920236

XIOC detected MD5 Hash: 2256219D045411EB8C98C90E7D920236

extracted_from_files

URL
detected URL: https://www.googleapis.com/oauth2/v2/userinfo

XIOC detected URL: https://www.googleapis.com/oauth2/v2/userinfo

extracted_from_files

URL
detected URL: https://www.googleapis.com/upload/drive/v3/files/$

XIOC detected URL: https://www.googleapis.com/upload/drive/v3/files/$

extracted_from_files

URL
detected URL: https://www.googleapis.com/drive/v3/files

XIOC detected URL: https://www.googleapis.com/drive/v3/files

extracted_from_files

Hash
detected MD5 Hash: 2256219C045411EB8C98C90E7D920236

XIOC detected MD5 Hash: 2256219C045411EB8C98C90E7D920236

extracted_from_files

Domain
detected Domain: clients2.google.com

XIOC detected Domain: clients2.google.com

extracted_from_files

Security Analysis Summary

Security Analysis Overview

TextEase - Text Shortcuts & Smart AI Prompts Expander is a Chrome Web Store extension published by [email protected]. Version 2.1 has been analyzed by the Risky Plugins security platform, receiving a risk score of 55.55/100 (MEDIUM risk) based on 114 security findings.

Risk Assessment

This extension presents moderate security risk. Several findings were detected that may warrant attention. Users should carefully review the permissions and findings before installation.

Findings Breakdown

  • High: 33 finding(s)
  • Medium: 81 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

TextEase - Text Shortcuts & Smart AI Prompts Expander is published by [email protected] on the Chrome Web Store marketplace. The extension has approximately 11 users.

Recommendation

Exercise caution with this extension. Review the detailed findings and ensure the requested permissions align with the extension's stated functionality before installation.

Frequently Asked Questions