Is "OpenLink YouID" on Firefox Add-ons Safe to Install?

OpenLink Software Inc · firefox · v1.7.20

Browser Extension that enables you to register and switch Web Identities (WebIDs) across a single HTTPS (TLS) session without browser restart. Each of these WebIDs is a hyperlink that identifies an application-user while also resolving to a profile document containing claims (both machine- and human-readable) that are verifiable using existing Public Key Infrastructure (PKI) standards.

Risk Assessment

Pending
0
out of 100
MINIMAL

0 security findings detected across all analyzers

Firefox extension requesting 13 permissions

No Threats Detected

This extension passed all security checks

About This Extension

Browser Extension that enables you to register and switch Web Identities (WebIDs) across a single HTTPS (TLS) session without browser restart. Each of these WebIDs is a hyperlink that identifies an application-user while also resolving to a profile document containing claims (both machine- and human-readable) that are verifiable using existing Public Key Infrastructure (PKI) standards.

No Findings

All security checks passed

AI Security Report

AI Security Analysis: OpenLink YouID

Analysis generated: 2025-12-12T19:55:03+13:00
Model: gemini-3-pro-preview


Quick Facts

Property Value
UUID 76b3c979-19fa-591b-8314-633abd233bcb
Type firefox
Version
Users 7
Risk Score 100.0/100 (CRITICAL)
Malware Detected ⚠️ Yes
Secrets Exposed ✅ No
Critical Vulns ✅ No

AI Analysis

Executive Summary

The OpenLink YouID Firefox extension represents a CRITICAL security risk and should be immediately blocked from installation or removed from any environment where it is present. With a risk score of 100/100, this extension exhibits multiple high-severity indicators consistent with malware, including attempts to establish persistence on the host system, execute system-level commands, and obfuscate its code. The extremely low user count (7) and unverified publisher status further suggest this is not a legitimate or widely vetted tool.

Threat Assessment

The security posture of this extension is highly alarming due to the convergence of several dangerous behaviors typically seen in "droppers" or malicious payloads rather than standard browser extensions.

  • System Integrity Compromise: The presence of postinstall_persistence_mechanism and postinstall_system_command YARA matches indicates the extension likely contains code designed to survive browser restarts and execute commands on the underlying operating system. This violates the standard browser sandbox model and poses a direct threat to the host machine.
  • Malicious Code Indicators: The analysis detected 236 malware signatures. Specifically, the combination of postinstall_obfuscation, postinstall_file_download, and postinstall_crypto_operations suggests the extension may attempt to download additional payloads, hide its logic, and potentially engage in unauthorized cryptographic activities (such as cryptomining or ransomware-like encryption).
  • Network Activity: With 75 network findings and over 2,500 Indicators of Compromise (IOCs) detected, the extension likely communicates with a vast network of external endpoints. In this context, this volume often indicates communication with Command & Control (C2) servers or the presence of a large blocklist/target list.
  • Lack of Trust: The publisher is unverified, and the user count is negligible (7). There is no "herd immunity" or community vetting for this software.

Risk Justification

The calculated risk score of 100.0/100 is fully justified and accurate based on the provided data.

  • Severity of Capabilities: Browser extensions should rarely, if ever, trigger alerts for "system commands" or "persistence mechanisms." These are characteristics of Trojans or Rootkits.
  • Obfuscation: The deliberate use of obfuscation (postinstall_obfuscation) implies an intent to evade analysis and security controls.
  • Attack Surface: The extension appears to attempt to bridge the gap between the browser and the OS file system (postinstall_file_manipulation), significantly widening the potential blast radius of a compromise.

Key Findings

  • Persistence Mechanisms (High Severity): YARA rules matched code intended to maintain access to the system after a reboot or restart, a hallmark of malware.
  • System Command Execution (High Severity): The extension contains logic to execute shell or system-level commands, bypassing browser isolation.
  • Code Obfuscation (High Severity): Multiple findings indicate the code has been intentionally obscured to hinder reverse engineering and security scanning.
  • Cryptographic Operations (High Severity): Unexplained cryptographic functions were detected, raising risks of cryptojacking or data encryption.
  • Massive IOC Count: The presence of 2,512 IOCs suggests the extension contains a hardcoded list of malicious domains or IPs, potentially for C2 communication.
  • Unsafe Coding Practices: Usage of eval() (NoUseEval) and weak random number generators (NoUseWeakRandom) introduces additional vulnerabilities even if the malicious intent were disregarded.

Recommendations

  1. Immediate Block: Blacklist the extension UUID (76b3c979-19fa-591b-8314-633abd233bcb) in all organizational browser policies immediately.
  2. Endpoint Scan: Query endpoint management systems to identify the 7 users who have installed this extension. Isolate these machines for forensic analysis.
  3. Forensic Investigation: For affected machines, investigate for persistence mechanisms (e.g., scheduled tasks, registry keys) and unauthorized file downloads, as suggested by the YARA matches.
  4. Network Blocking: Review the 75 network findings (if detailed logs are available) and block associated domains at the firewall level.
  5. Credential Reset: Due to the potential for data exfiltration and credential_env_files matches, require a password reset for users who had this extension installed.

Mitigation Strategies

There are no safe mitigation strategies for using this extension.

Due to the critical nature of the findings (specifically persistence and system command execution), the risk cannot be mitigated while keeping the extension active.

  • If usage is absolutely mandatory for forensic research: It must be run in a strictly isolated, non-networked sandbox or disposable Virtual Machine that is destroyed immediately after use. It should never be installed on a production machine or a device with access to sensitive data.

Confidence Assessment

Confidence Level: 80% (High)

The analysis is based on strong, specific YARA signatures that correlate with known malware behaviors. While false positives are possible with generic rules, the specific combination of persistence, system commands, and obfuscation creates a distinct and highly malicious fingerprint. The low user count and unverified publisher status provide corroborating context that supports the technical findings. The only factor preventing 100% confidence is the lack of manual dynamic analysis (running the code in a lab) to confirm the execution of these triggers.


Disclaimer

This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.

Frequently Asked Questions