Is "Shakel-Table" on Chrome Web Store Safe to Install?

[email protected] · chrome · v2.4.3

Looking for an easy way to convert your spreadsheets into beautiful tables? Look no further than our powerful extension! With just a few clicks, you can transform your spreadsheets into stunning, easy-to-read tables that are perfect for managing leads, sending SMS messages, and even reaching out to customers on WhatsApp. Our extension is incredibly user-friendly and easy to use, even if you have no previous experience with spreadsheets or table formatting. With a variety of customizable options, you can create tables that fit your unique needs and preferences, whether you're looking to organize your sales data or keep track of your contacts. In addition to its powerful table conversion capabilities, our extension also offers a variety of tools for managing your leads and communicating with your customers. With our easy-to-use campaign sequences, you can set up automated messaging sequences that will send SMS or WhatsApp messages to your leads at the perfect time. And if you need to send bulk messages to a large group of customers or leads, our extension has you covered. With just a few clicks, you can send messages to multiple recipients at once, making it easy to stay in touch with your entire audience. Best of all, our extension makes it easy to filter your leads based on their attitudes and preferences, so you can customize your messaging and ensure that you're reaching the right people at the right time. Whether you're looking to close more sales or simply stay in touch with your customers, our extension is the perfect tool for streamlining your communications and taking your business to the next level. So why wait? Install our extension today and start taking your spreadsheet game to the next level!

Risk Assessment

Analyzed
64.93
out of 100
MEDIUM

471 security findings detected across all analyzers

Chrome extension requesting 3 permissions

Severity Breakdown

0
Critical
63
High
408
Medium
0
Low
0
Info

Finding Categories

61
Malware Signatures
2
Obfuscation
1
Network
376
IoC Indicators

YARA Rules Matched

9 rules(61 hits)
NoUseWeakRandom postinstall file manipulation postinstall obfuscation postinstall network communication postinstall file download postinstall system command postinstall crypto operations postinstall registry modification postinstall persistence mechanism

Requested Permissions

3 permissions
identity

Access your identity and sign-in tokens

High
tabs
Medium
storage
Low

About This Extension

Looking for an easy way to convert your spreadsheets into beautiful tables? Look no further than our powerful extension! With just a few clicks, you can transform your spreadsheets into stunning, easy-to-read tables that are perfect for managing leads, sending SMS messages, and even reaching out to customers on WhatsApp. Our extension is incredibly user-friendly and easy to use, even if you have no previous experience with spreadsheets or table formatting. With a variety of customizable options, you can create tables that fit your unique needs and preferences, whether you're looking to organize your sales data or keep track of your contacts. In addition to its powerful table conversion capabilities, our extension also offers a variety of tools for managing your leads and communicating with your customers. With our easy-to-use campaign sequences, you can set up automated messaging sequences that will send SMS or WhatsApp messages to your leads at the perfect time. And if you need to send bulk messages to a large group of customers or leads, our extension has you covered. With just a few clicks, you can send messages to multiple recipients at once, making it easy to stay in touch with your entire audience. Best of all, our extension makes it easy to filter your leads based on their attitudes and preferences, so you can customize your messaging and ensure that you're reaching the right people at the right time. Whether you're looking to close more sales or simply stay in touch with your customers, our extension is the perfect tool for streamlining your communications and taking your business to the next level. So why wait? Install our extension today and start taking your spreadsheet game to the next level!

Detailed Findings

65 total

YARA Rule Matches

9 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
33
IP Addresses
13
Domains
339
Strings
376

All Indicators · 376

Domain
detected Domain: h.tr

XIOC detected Domain: h.tr

extracted_from_files

Domain
detected Domain: qc.call

XIOC detected Domain: qc.call

extracted_from_files

Domain
detected Domain: m.next

XIOC detected Domain: m.next

extracted_from_files

URL
detected URL: https://sheets.googleapis.com/v4/spreadsheets/$

XIOC detected URL: https://sheets.googleapis.com/v4/spreadsheets/$

extracted_from_files

Domain
detected Domain: t.map

XIOC detected Domain: t.map

extracted_from_files

Domain
detected Domain: t.run

XIOC detected Domain: t.run

extracted_from_files

IP
detected Domain: script.google.com

XIOC detected Domain: script.google.com

extracted_from_files

Domain
detected Domain: github.com

XIOC detected Domain: github.com

extracted_from_files

IP
detected IP: ed::

XIOC detected IP: ed::

extracted_from_files

IP
detected IP: e::

XIOC detected IP: e::

extracted_from_files

IP
detected IP: ::f

XIOC detected IP: ::f

extracted_from_files

Domain
detected Domain: e.call

XIOC detected Domain: e.call

extracted_from_files

Domain
detected Domain: i.call

XIOC detected Domain: i.call

extracted_from_files

Domain
detected Domain: o.call

XIOC detected Domain: o.call

extracted_from_files

Domain
detected Domain: e.has.call

XIOC detected Domain: e.has.call

extracted_from_files

Domain
detected Domain: u.call

XIOC detected Domain: u.call

extracted_from_files

Domain
detected Domain: r.au

XIOC detected Domain: r.au

extracted_from_files

Domain
detected Domain: r.kn

XIOC detected Domain: r.kn

extracted_from_files

Domain
detected Domain: c.global

XIOC detected Domain: c.global

extracted_from_files

Domain
detected Domain: c.name

XIOC detected Domain: c.name

extracted_from_files

Domain
detected Domain: object.is

XIOC detected Domain: object.is

extracted_from_files

Domain
detected Domain: p.call

XIOC detected Domain: p.call

extracted_from_files

Domain
detected Domain: w.call

XIOC detected Domain: w.call

extracted_from_files

Domain
detected Domain: f.next

XIOC detected Domain: f.next

extracted_from_files

Domain
detected Domain: r.call

XIOC detected Domain: r.call

extracted_from_files

Domain
detected Domain: t.name

XIOC detected Domain: t.name

extracted_from_files

Domain
detected Domain: o.is

XIOC detected Domain: o.is

extracted_from_files

Domain
detected Domain: u.data

XIOC detected Domain: u.data

extracted_from_files

Domain
detected Domain: r.is

XIOC detected Domain: r.is

extracted_from_files

Domain
detected Domain: function.prototype.call

XIOC detected Domain: function.prototype.call

extracted_from_files

Domain
detected Domain: t.global

XIOC detected Domain: t.global

extracted_from_files

Domain
detected Domain: t.target

XIOC detected Domain: t.target

extracted_from_files

Domain
detected Domain: i.name

XIOC detected Domain: i.name

extracted_from_files

Domain
detected Domain: api-shakel-table.kaprylo.com

XIOC detected Domain: api-shakel-table.kaprylo.com

extracted_from_files

Domain
detected Domain: developer.mozilla.org

XIOC detected Domain: developer.mozilla.org

extracted_from_files

Domain
detected Domain: e.is

XIOC detected Domain: e.is

extracted_from_files

Domain
detected Domain: object.prototype.hasownproperty.call

XIOC detected Domain: object.prototype.hasownproperty.call

extracted_from_files

Domain
detected Domain: push.call

XIOC detected Domain: push.call

extracted_from_files

Domain
detected Domain: zloirock.ru

XIOC detected Domain: zloirock.ru

extracted_from_files

Domain
detected Domain: chrome.runtime.id

XIOC detected Domain: chrome.runtime.id

extracted_from_files

Domain
detected Domain: e.name

XIOC detected Domain: e.name

extracted_from_files

Domain
detected Domain: a.data

XIOC detected Domain: a.data

extracted_from_files

Domain
detected Domain: n.is

XIOC detected Domain: n.is

extracted_from_files

Domain
detected Domain: e.global

XIOC detected Domain: e.global

extracted_from_files

Domain
detected Domain: e.target

XIOC detected Domain: e.target

extracted_from_files

Domain
detected Domain: i.global

XIOC detected Domain: i.global

extracted_from_files

Domain
detected Domain: t.data

XIOC detected Domain: t.data

extracted_from_files

Domain
detected Domain: s.run

XIOC detected Domain: s.run

extracted_from_files

Domain
detected Domain: window.open

XIOC detected Domain: window.open

extracted_from_files

Domain
detected Domain: s.top

XIOC detected Domain: s.top

extracted_from_files

Domain
detected Domain: e.windows

XIOC detected Domain: e.windows

extracted_from_files

Domain
detected Domain: e.management

XIOC detected Domain: e.management

extracted_from_files

Domain
detected Domain: extensionpay.com

XIOC detected Domain: extensionpay.com

extracted_from_files

Domain
detected Domain: textarea.form-control.is

XIOC detected Domain: textarea.form-control.is

extracted_from_files

Domain
detected Domain: form-control.is

XIOC detected Domain: form-control.is

extracted_from_files

Domain
detected Domain: c.id

XIOC detected Domain: c.id

extracted_from_files

Domain
detected Domain: www.w3.org

XIOC detected Domain: www.w3.org

extracted_from_files

Domain
detected Domain: getbootstrap.com

XIOC detected Domain: getbootstrap.com

extracted_from_files

Domain
detected Domain: e.email

XIOC detected Domain: e.email

extracted_from_files

Domain
detected Domain: n.map

XIOC detected Domain: n.map

extracted_from_files

Domain
detected Domain: modal.show

XIOC detected Domain: modal.show

extracted_from_files

Domain
detected Domain: nav-item.show

XIOC detected Domain: nav-item.show

extracted_from_files

Domain
detected Domain: dropdown-menu.show

XIOC detected Domain: dropdown-menu.show

extracted_from_files

Domain
detected Domain: btn.show

XIOC detected Domain: btn.show

extracted_from_files

Domain
detected Domain: form-check-input.is

XIOC detected Domain: form-check-input.is

extracted_from_files

Domain
detected Domain: form-control-color.is

XIOC detected Domain: form-control-color.is

extracted_from_files

Domain
detected Domain: form-select.is

XIOC detected Domain: form-select.is

extracted_from_files

Domain
detected Domain: offcanvas-xxl.show

XIOC detected Domain: offcanvas-xxl.show

extracted_from_files

Domain
detected Domain: offcanvas-xl.show

XIOC detected Domain: offcanvas-xl.show

extracted_from_files

Domain
detected Domain: offcanvas-lg.show

XIOC detected Domain: offcanvas-lg.show

extracted_from_files

Domain
detected Domain: offcanvas-md.show

XIOC detected Domain: offcanvas-md.show

extracted_from_files

Domain
detected Domain: offcanvas-sm.show

XIOC detected Domain: offcanvas-sm.show

extracted_from_files

IP
detected Domain: tooltip.show

XIOC detected Domain: tooltip.show

extracted_from_files

Domain
detected Domain: modal-backdrop.show

XIOC detected Domain: modal-backdrop.show

extracted_from_files

Domain
detected Domain: v.id

XIOC detected Domain: v.id

extracted_from_files

Domain
detected Domain: e.id

XIOC detected Domain: e.id

extracted_from_files

Domain
detected Domain: e.parts

XIOC detected Domain: e.parts

extracted_from_files

Domain
detected Domain: i.id

XIOC detected Domain: i.id

extracted_from_files

Domain
detected Domain: this.map

XIOC detected Domain: this.map

extracted_from_files

Domain
detected Domain: offcanvas-backdrop.show

XIOC detected Domain: offcanvas-backdrop.show

extracted_from_files

Domain
detected Domain: offcanvas.show

XIOC detected Domain: offcanvas.show

extracted_from_files

Domain
detected Domain: z.call

XIOC detected Domain: z.call

extracted_from_files

Domain
detected Domain: h.id

XIOC detected Domain: h.id

extracted_from_files

Domain
detected Domain: h.media

XIOC detected Domain: h.media

extracted_from_files

Domain
detected Domain: c.media

XIOC detected Domain: c.media

extracted_from_files

Domain
detected Domain: l.media

XIOC detected Domain: l.media

extracted_from_files

Domain
detected Domain: v.parts

XIOC detected Domain: v.parts

extracted_from_files

Domain
detected Domain: l.parts

XIOC detected Domain: l.parts

extracted_from_files

Domain
detected Domain: v.call

XIOC detected Domain: v.call

extracted_from_files

Domain
detected Domain: n.call

XIOC detected Domain: n.call

extracted_from_files

Domain
detected Domain: l.call

XIOC detected Domain: l.call

extracted_from_files

Domain
detected Domain: v.has.call

XIOC detected Domain: v.has.call

extracted_from_files

Domain
detected Domain: c.map

XIOC detected Domain: c.map

extracted_from_files

Domain
detected Domain: c.run

XIOC detected Domain: c.run

extracted_from_files

Domain
detected Domain: y.call

XIOC detected Domain: y.call

extracted_from_files

Domain
detected Domain: l.id

XIOC detected Domain: l.id

extracted_from_files

Domain
detected Domain: h.call

XIOC detected Domain: h.call

extracted_from_files

Domain
detected Domain: v.map

XIOC detected Domain: v.map

extracted_from_files

Domain
detected Domain: l.ec

XIOC detected Domain: l.ec

extracted_from_files

Domain
detected Domain: h.hr

XIOC detected Domain: h.hr

extracted_from_files

Domain
detected Domain: h.kn

XIOC detected Domain: h.kn

extracted_from_files

Domain
detected Domain: c.style

XIOC detected Domain: c.style

extracted_from_files

Domain
detected Domain: a.style

XIOC detected Domain: a.style

extracted_from_files

Domain
detected Domain: c.is

XIOC detected Domain: c.is

extracted_from_files

Domain
detected Domain: n.app

XIOC detected Domain: n.app

extracted_from_files

Domain
detected Domain: c.call

XIOC detected Domain: c.call

extracted_from_files

Domain
detected Domain: c.exposed

XIOC detected Domain: c.exposed

extracted_from_files

Domain
detected Domain: c.data

XIOC detected Domain: c.data

extracted_from_files

Domain
detected Domain: c.target

XIOC detected Domain: c.target

extracted_from_files

Domain
detected Domain: h.style

XIOC detected Domain: h.style

extracted_from_files

Domain
detected Domain: c.suspense.next

XIOC detected Domain: c.suspense.next

extracted_from_files

Domain
detected Domain: c.next

XIOC detected Domain: c.next

extracted_from_files

Domain
detected Domain: m.id

XIOC detected Domain: m.id

extracted_from_files

Domain
detected Domain: e.run

XIOC detected Domain: e.run

extracted_from_files

Domain
detected Domain: l.next

XIOC detected Domain: l.next

extracted_from_files

Domain
detected Domain: h.name

XIOC detected Domain: h.name

extracted_from_files

Domain
detected Domain: h.target

XIOC detected Domain: h.target

extracted_from_files

Domain
detected Domain: h.map

XIOC detected Domain: h.map

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: array.prototype.slice.call

XIOC detected Domain: array.prototype.slice.call

extracted_from_files

Domain
detected Domain: on.scope.off

XIOC detected Domain: on.scope.off

extracted_from_files

Domain
detected Domain: n.style

XIOC detected Domain: n.style

extracted_from_files

Domain
detected Domain: a.call

XIOC detected Domain: a.call

extracted_from_files

Domain
detected Domain: o.has.call

XIOC detected Domain: o.has.call

extracted_from_files

Domain
detected Domain: e.au

XIOC detected Domain: e.au

extracted_from_files

Domain
detected Domain: e.kn

XIOC detected Domain: e.kn

extracted_from_files

Domain
detected Domain: sheets.googleapis.com

XIOC detected Domain: sheets.googleapis.com

extracted_from_files

Domain
detected Domain: shakelchat.com

XIOC detected Domain: shakelchat.com

extracted_from_files

Domain
detected Domain: seftsms.com

XIOC detected Domain: seftsms.com

extracted_from_files

Domain
detected Domain: l.global

XIOC detected Domain: l.global

extracted_from_files

Domain
detected Domain: l.name

XIOC detected Domain: l.name

extracted_from_files

Domain
detected Domain: b.call

XIOC detected Domain: b.call

extracted_from_files

Domain
detected Domain: t.call

XIOC detected Domain: t.call

extracted_from_files

Domain
detected Domain: t.effect.run

XIOC detected Domain: t.effect.run

extracted_from_files

Domain
detected Domain: k.call

XIOC detected Domain: k.call

extracted_from_files

Domain
detected Domain: p.next

XIOC detected Domain: p.next

extracted_from_files

Domain
detected Domain: o.parts

XIOC detected Domain: o.parts

extracted_from_files

Domain
detected Domain: o.id

XIOC detected Domain: o.id

extracted_from_files

Domain
detected Domain: s.id

XIOC detected Domain: s.id

extracted_from_files

Domain
detected Domain: s.parts

XIOC detected Domain: s.parts

extracted_from_files

Domain
detected Domain: e.auto

XIOC detected Domain: e.auto

extracted_from_files

Domain
detected Domain: t.id

XIOC detected Domain: t.id

extracted_from_files

Domain
detected Domain: i.data

XIOC detected Domain: i.data

extracted_from_files

Domain
detected Domain: t.hr

XIOC detected Domain: t.hr

extracted_from_files

Domain
detected Domain: e.map

XIOC detected Domain: e.map

extracted_from_files

Domain
detected Domain: n.ec

XIOC detected Domain: n.ec

extracted_from_files

Domain
detected Domain: r.id

XIOC detected Domain: r.id

extracted_from_files

Domain
detected Domain: r.media

XIOC detected Domain: r.media

extracted_from_files

Domain
detected Domain: t.media

XIOC detected Domain: t.media

extracted_from_files

Domain
detected Domain: e.media

XIOC detected Domain: e.media

extracted_from_files

Domain
detected Domain: o.map

XIOC detected Domain: o.map

extracted_from_files

Domain
detected Domain: r.pg

XIOC detected Domain: r.pg

extracted_from_files

Domain
detected Domain: r.yt

XIOC detected Domain: r.yt

extracted_from_files

Domain
detected Domain: t.tr

XIOC detected Domain: t.tr

extracted_from_files

Domain
detected Domain: m.call

XIOC detected Domain: m.call

extracted_from_files

Domain
detected Domain: t.kn

XIOC detected Domain: t.kn

extracted_from_files

Domain
detected Domain: t.rs

XIOC detected Domain: t.rs

extracted_from_files

Domain
detected Domain: o.exposed

XIOC detected Domain: o.exposed

extracted_from_files

Domain
detected Domain: o.data

XIOC detected Domain: o.data

extracted_from_files

Domain
detected Domain: r.lk

XIOC detected Domain: r.lk

extracted_from_files

Domain
detected Domain: t.dm

XIOC detected Domain: t.dm

extracted_from_files

Domain
detected Domain: w.id

XIOC detected Domain: w.id

extracted_from_files

Domain
detected Domain: t.au

XIOC detected Domain: t.au

extracted_from_files

Domain
detected Domain: k.run

XIOC detected Domain: k.run

extracted_from_files

Domain
detected Domain: f.style

XIOC detected Domain: f.style

extracted_from_files

Domain
detected Domain: g.style

XIOC detected Domain: g.style

extracted_from_files

Domain
detected Domain: u.is

XIOC detected Domain: u.is

extracted_from_files

Domain
detected Domain: a.app

XIOC detected Domain: a.app

extracted_from_files

Domain
detected Domain: t.no

XIOC detected Domain: t.no

extracted_from_files

Domain
detected Domain: t.gg

XIOC detected Domain: t.gg

extracted_from_files

Domain
detected Domain: r.map

XIOC detected Domain: r.map

extracted_from_files

Domain
detected Domain: r.target

XIOC detected Domain: r.target

extracted_from_files

Domain
detected Domain: e.style

XIOC detected Domain: e.style

extracted_from_files

Domain
detected Domain: t.suspense.next

XIOC detected Domain: t.suspense.next

extracted_from_files

Domain
detected Domain: t.next

XIOC detected Domain: t.next

extracted_from_files

Domain
detected Domain: p.run

XIOC detected Domain: p.run

extracted_from_files

Domain
detected Domain: t.ir

XIOC detected Domain: t.ir

extracted_from_files

Domain
detected Domain: e.next

XIOC detected Domain: e.next

extracted_from_files

Domain
detected Domain: array.prototype.filter.call

XIOC detected Domain: array.prototype.filter.call

extracted_from_files

Domain
detected Domain: r.style

XIOC detected Domain: r.style

extracted_from_files

Domain
detected Domain: r.name

XIOC detected Domain: r.name

extracted_from_files

Domain
detected Domain: t.exposed

XIOC detected Domain: t.exposed

extracted_from_files

Domain
detected Domain: to.scope.off

XIOC detected Domain: to.scope.off

extracted_from_files

Domain
detected Domain: r.bj

XIOC detected Domain: r.bj

extracted_from_files

Domain
detected Domain: o.style

XIOC detected Domain: o.style

extracted_from_files

Domain
detected Domain: l.data

XIOC detected Domain: l.data

extracted_from_files

Domain
detected Domain: j.call

XIOC detected Domain: j.call

extracted_from_files

Domain
detected Domain: n.au

XIOC detected Domain: n.au

extracted_from_files

Domain
detected Domain: n.kn

XIOC detected Domain: n.kn

extracted_from_files

Domain
detected Domain: www.shakeltable.com

XIOC detected Domain: www.shakeltable.com

extracted_from_files

IP
detected Domain: script.googleapis.com

XIOC detected Domain: script.googleapis.com

extracted_from_files

Domain
detected Domain: t.zw

XIOC detected Domain: t.zw

extracted_from_files

Domain
detected Domain: n.parts

XIOC detected Domain: n.parts

extracted_from_files

Domain
detected Domain: i.parts

XIOC detected Domain: i.parts

extracted_from_files

Domain
detected Domain: setup.auto

XIOC detected Domain: setup.auto

extracted_from_files

Domain
detected Domain: n.id

XIOC detected Domain: n.id

extracted_from_files

Domain
detected Domain: r.no

XIOC detected Domain: r.no

extracted_from_files

Domain
detected Domain: n.auto

XIOC detected Domain: n.auto

extracted_from_files

Domain
detected Domain: t.is

XIOC detected Domain: t.is

extracted_from_files

Domain
detected Domain: n.pg

XIOC detected Domain: n.pg

extracted_from_files

Domain
detected Domain: n.yt

XIOC detected Domain: n.yt

extracted_from_files

Domain
detected Domain: h.rs

XIOC detected Domain: h.rs

extracted_from_files

URL
detected URL: https://github.com/zloirock/core-js/blob/v3.27.1/LICENSE

XIOC detected URL: https://github.com/zloirock/core-js/blob/v3.27.1/LICENSE

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

URL
detected URL: https://www.shakeltable.com/p/tos.html?m=1

XIOC detected URL: https://www.shakeltable.com/p/tos.html?m=1

extracted_from_files

Domain
detected Domain: n.media

XIOC detected Domain: n.media

extracted_from_files

Domain
detected Domain: h.no

XIOC detected Domain: h.no

extracted_from_files

Domain
detected Domain: h.gg

XIOC detected Domain: h.gg

extracted_from_files

Domain
detected Domain: n.lk

XIOC detected Domain: n.lk

extracted_from_files

Domain
detected Domain: h.dm

XIOC detected Domain: h.dm

extracted_from_files

Domain
detected Domain: p.id

XIOC detected Domain: p.id

extracted_from_files

Domain
detected Domain: h.au

XIOC detected Domain: h.au

extracted_from_files

Domain
detected Domain: b.run

XIOC detected Domain: b.run

extracted_from_files

Domain
detected Domain: a.id

XIOC detected Domain: a.id

extracted_from_files

Domain
detected Domain: m.run

XIOC detected Domain: m.run

extracted_from_files

Domain
detected Domain: h.ir

XIOC detected Domain: h.ir

extracted_from_files

Domain
detected Domain: n.next

XIOC detected Domain: n.next

extracted_from_files

Domain
detected Domain: l.style

XIOC detected Domain: l.style

extracted_from_files

Domain
detected Domain: a.is

XIOC detected Domain: a.is

extracted_from_files

Domain
detected Domain: r.app

XIOC detected Domain: r.app

extracted_from_files

Domain
detected Domain: h.zw

XIOC detected Domain: h.zw

extracted_from_files

Domain
detected Domain: t.data.map

XIOC detected Domain: t.data.map

extracted_from_files

Domain
detected Domain: jn.cx

XIOC detected Domain: jn.cx

extracted_from_files

Domain
detected Domain: mv.scope.off

XIOC detected Domain: mv.scope.off

extracted_from_files

Domain
detected Domain: n.bj

XIOC detected Domain: n.bj

extracted_from_files

Domain
detected Domain: t.style

XIOC detected Domain: t.style

extracted_from_files

Domain
detected Domain: v.style

XIOC detected Domain: v.style

extracted_from_files

Domain
detected Domain: t.auto

XIOC detected Domain: t.auto

extracted_from_files

Domain
detected Domain: e.link

XIOC detected Domain: e.link

extracted_from_files

Domain
detected Domain: jn.tn

XIOC detected Domain: jn.tn

extracted_from_files

Domain
detected Domain: xt.sa

XIOC detected Domain: xt.sa

extracted_from_files

Domain
detected Domain: xt.no

XIOC detected Domain: xt.no

extracted_from_files

Domain
detected Domain: e.country

XIOC detected Domain: e.country

extracted_from_files

Domain
detected Domain: e.phone

XIOC detected Domain: e.phone

extracted_from_files

Domain
detected Domain: clients2.google.com

XIOC detected Domain: clients2.google.com

extracted_from_files

Domain
detected Domain: a.hr

XIOC detected Domain: a.hr

extracted_from_files

Domain
detected Domain: t.top

XIOC detected Domain: t.top

extracted_from_files

Domain
detected Domain: vm.windows

XIOC detected Domain: vm.windows

extracted_from_files

Domain
detected Domain: vm.management

XIOC detected Domain: vm.management

extracted_from_files

Domain
detected Domain: xt.pm

XIOC detected Domain: xt.pm

extracted_from_files

Domain
detected Domain: l.value.map

XIOC detected Domain: l.value.map

extracted_from_files

Domain
detected Domain: l.app

XIOC detected Domain: l.app

extracted_from_files

Domain
detected Domain: gc.call

XIOC detected Domain: gc.call

extracted_from_files

Domain
detected Domain: o.next

XIOC detected Domain: o.next

extracted_from_files

Domain
detected Domain: l.is

XIOC detected Domain: l.is

extracted_from_files

Domain
detected Domain: r.data

XIOC detected Domain: r.data

extracted_from_files

Domain
detected Domain: 818530120-s0dfn7hj5f0k4b97hhh8p771fkp4gco8.apps.googleusercontent.com

XIOC detected Domain: 818530120-s0dfn7hj5f0k4b97hhh8p771fkp4gco8.apps.googleusercontent.com

extracted_from_files

Domain
detected Domain: www.googleapis.com

XIOC detected Domain: www.googleapis.com

extracted_from_files

Domain
detected Domain: r.value.email

XIOC detected Domain: r.value.email

extracted_from_files

Domain
detected Domain: gmail.com

XIOC detected Domain: gmail.com

extracted_from_files

Domain
detected Domain: l.run

XIOC detected Domain: l.run

extracted_from_files

Domain
detected Domain: l.top

XIOC detected Domain: l.top

extracted_from_files

Domain
detected Domain: or.windows

XIOC detected Domain: or.windows

extracted_from_files

Domain
detected Domain: or.management

XIOC detected Domain: or.management

extracted_from_files

Domain
detected Domain: dl.scope.off

XIOC detected Domain: dl.scope.off

extracted_from_files

Domain
detected Domain: yn.scope.off

XIOC detected Domain: yn.scope.off

extracted_from_files

Domain
detected Domain: r.run

XIOC detected Domain: r.run

extracted_from_files

Domain
detected Domain: d.style

XIOC detected Domain: d.style

extracted_from_files

Domain
detected Domain: f.is

XIOC detected Domain: f.is

extracted_from_files

Domain
detected Domain: z.run

XIOC detected Domain: z.run

extracted_from_files

Domain
detected Domain: s.call

XIOC detected Domain: s.call

extracted_from_files

Domain
detected Domain: r.parts

XIOC detected Domain: r.parts

extracted_from_files

Domain
detected Domain: r.ec

XIOC detected Domain: r.ec

extracted_from_files

Domain
detected Domain: ht.call

XIOC detected Domain: ht.call

extracted_from_files

Domain
detected Domain: d.next

XIOC detected Domain: d.next

extracted_from_files

Domain
detected Domain: i.is

XIOC detected Domain: i.is

extracted_from_files

Domain
detected Domain: s.global

XIOC detected Domain: s.global

extracted_from_files

Domain
detected Domain: s.name

XIOC detected Domain: s.name

extracted_from_files

Domain
detected Domain: www.chartjs.org

XIOC detected Domain: www.chartjs.org

extracted_from_files

Domain
detected Domain: i.style

XIOC detected Domain: i.style

extracted_from_files

Domain
detected Domain: d.id

XIOC detected Domain: d.id

extracted_from_files

Domain
detected Domain: r.next

XIOC detected Domain: r.next

extracted_from_files

Domain
detected Domain: i.app

XIOC detected Domain: i.app

extracted_from_files

Domain
detected Domain: o.name

XIOC detected Domain: o.name

extracted_from_files

Domain
detected Domain: u.id

XIOC detected Domain: u.id

extracted_from_files

Domain
detected Domain: x.run

XIOC detected Domain: x.run

extracted_from_files

Domain
detected Domain: t.save

XIOC detected Domain: t.save

extracted_from_files

Domain
detected Domain: t.family

XIOC detected Domain: t.family

extracted_from_files

Domain
detected Domain: this.events

XIOC detected Domain: this.events

extracted_from_files

Domain
detected Domain: fl.numeric.call

XIOC detected Domain: fl.numeric.call

extracted_from_files

Domain
detected Domain: fl.call

XIOC detected Domain: fl.call

extracted_from_files

Domain
detected Domain: object.prototype.tostring.call

XIOC detected Domain: object.prototype.tostring.call

extracted_from_files

Domain
detected Domain: vi.scope.off

XIOC detected Domain: vi.scope.off

extracted_from_files

Domain
detected Domain: r.clienty-t.top

XIOC detected Domain: r.clienty-t.top

extracted_from_files

Domain
detected Domain: r.top

XIOC detected Domain: r.top

extracted_from_files

Domain
detected Domain: e.host

XIOC detected Domain: e.host

extracted_from_files

Domain
detected Domain: e.family

XIOC detected Domain: e.family

extracted_from_files

Domain
detected Domain: e.bottom-e.top

XIOC detected Domain: e.bottom-e.top

extracted_from_files

Domain
detected Domain: e.top

XIOC detected Domain: e.top

extracted_from_files

Domain
detected Domain: e.save

XIOC detected Domain: e.save

extracted_from_files

Domain
detected Domain: this.dataelementtype.id

XIOC detected Domain: this.dataelementtype.id

extracted_from_files

Domain
detected Domain: this.datasetelementtype.id

XIOC detected Domain: this.datasetelementtype.id

extracted_from_files

Domain
detected Domain: cachedmeta.data

XIOC detected Domain: cachedmeta.data

extracted_from_files

Domain
detected Domain: i.properties

XIOC detected Domain: i.properties

extracted_from_files

Domain
detected Domain: t.to

XIOC detected Domain: t.to

extracted_from_files

Domain
detected Domain: t.canvas.style

XIOC detected Domain: t.canvas.style

extracted_from_files

Domain
detected Domain: a.top

XIOC detected Domain: a.top

extracted_from_files

Domain
detected Domain: s.box

XIOC detected Domain: s.box

extracted_from_files

Domain
detected Domain: n.data

XIOC detected Domain: n.data

extracted_from_files

Domain
detected Domain: cachedmeta.total

XIOC detected Domain: cachedmeta.total

extracted_from_files

Domain
detected Domain: r.total

XIOC detected Domain: r.total

extracted_from_files

URL
detected URL: https://www.chartjs.org

XIOC detected URL: https://www.chartjs.org

extracted_from_files

URL
detected URL: https://github.com/kurkle/color#readme

XIOC detected URL: https://github.com/kurkle/color#readme

extracted_from_files

URL
detected URL: http://www.w3.org/2000/svg

XIOC detected URL: http://www.w3.org/2000/svg

extracted_from_files

Domain
detected Domain: this.top

XIOC detected Domain: this.top

extracted_from_files

Domain
detected Domain: this.id

XIOC detected Domain: this.id

extracted_from_files

Domain
detected Domain: d.top

XIOC detected Domain: d.top

extracted_from_files

Domain
detected Domain: e.box

XIOC detected Domain: e.box

extracted_from_files

Domain
detected Domain: h.top

XIOC detected Domain: h.top

extracted_from_files

Domain
detected Domain: o.outerheight-i.bottom-i.top

XIOC detected Domain: o.outerheight-i.bottom-i.top

extracted_from_files

Domain
detected Domain: i.top

XIOC detected Domain: i.top

extracted_from_files

Domain
detected Domain: o.save

XIOC detected Domain: o.save

extracted_from_files

Domain
detected Domain: z-e.top

XIOC detected Domain: z-e.top

extracted_from_files

Domain
detected Domain: g.data

XIOC detected Domain: g.data

extracted_from_files

Domain
detected Domain: margins.top

XIOC detected Domain: margins.top

extracted_from_files

Domain
detected Domain: this.fit

XIOC detected Domain: this.fit

extracted_from_files

Domain
detected Domain: o.top

XIOC detected Domain: o.top

extracted_from_files

Domain
detected Domain: this.chart.data

XIOC detected Domain: this.chart.data

extracted_from_files

Domain
detected Domain: this.config.data

XIOC detected Domain: this.config.data

extracted_from_files

Domain
detected Domain: i.canvas.id

XIOC detected Domain: i.canvas.id

extracted_from_files

Domain
detected Domain: config.data

XIOC detected Domain: config.data

extracted_from_files

Domain
detected Domain: e.plugin.id

XIOC detected Domain: e.plugin.id

extracted_from_files

Domain
detected Domain: t.plugin.id

XIOC detected Domain: t.plugin.id

extracted_from_files

Domain
detected Domain: object.prototype.isprototypeof.call

XIOC detected Domain: object.prototype.isprototypeof.call

extracted_from_files

Domain
detected Domain: n.top

XIOC detected Domain: n.top

extracted_from_files

Domain
detected Domain: o.target

XIOC detected Domain: o.target

extracted_from_files

Domain
detected Domain: kg.map

XIOC detected Domain: kg.map

extracted_from_files

Domain
detected Domain: s.style

XIOC detected Domain: s.style

extracted_from_files

Domain
detected Domain: e.options.events

XIOC detected Domain: e.options.events

extracted_from_files

Domain
detected Domain: this.options.events

XIOC detected Domain: this.options.events

extracted_from_files

Domain
detected Domain: i.top-o.top

XIOC detected Domain: i.top-o.top

extracted_from_files

Domain
detected Domain: t.events

XIOC detected Domain: t.events

extracted_from_files

Domain
detected Domain: n.save

XIOC detected Domain: n.save

extracted_from_files

Domain
detected Domain: i-l.top

XIOC detected Domain: i-l.top

extracted_from_files

Domain
detected Domain: eb.call

XIOC detected Domain: eb.call

extracted_from_files

Domain
detected Domain: o.external.call

XIOC detected Domain: o.external.call

extracted_from_files

Domain
detected Domain: padding.top

XIOC detected Domain: padding.top

extracted_from_files

Domain
detected Domain: i.show

XIOC detected Domain: i.show

extracted_from_files

Domain
detected Domain: r.save

XIOC detected Domain: r.save

extracted_from_files

Domain
detected Domain: t.values.map

XIOC detected Domain: t.values.map

extracted_from_files

Domain
detected Domain: cache.data

XIOC detected Domain: cache.data

extracted_from_files

Domain
detected Domain: this.ticks.map

XIOC detected Domain: this.ticks.map

extracted_from_files

Domain
detected Domain: t.adapters.date

XIOC detected Domain: t.adapters.date

extracted_from_files

Domain
detected Domain: 2-e.top

XIOC detected Domain: 2-e.top

extracted_from_files

Domain
detected Domain: nb.prototype.generateticklabels.call

XIOC detected Domain: nb.prototype.generateticklabels.call

extracted_from_files

URL
detected URL: https://extensionpay.com

XIOC detected URL: https://extensionpay.com

extracted_from_files

URL
detected URL: https://github.com/Glench/ExtPay#2-configure-your-manifestjson

XIOC detected URL: https://github.com/Glench/ExtPay#2-configure-your-manifestjson

extracted_from_files

URL
detected URL: https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/runtime/onMessage)

XIOC detected URL: https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/runtime/onMessage)

extracted_from_files

URL
detected URL: https://script.google.com/macros/s/AKfycbzV7JjBvAMMPmv5xdyoYsdiZx6q7l0FZSxg9Pn75UgY/dev

XIOC detected URL: https://script.google.com/macros/s/AKfycbzV7JjBvAMMPmv5xdyoYsdiZx6q7l0FZSxg9Pn75UgY/dev

extracted_from_files

URL
detected URL: https://getbootstrap.com/)

XIOC detected URL: https://getbootstrap.com/)

extracted_from_files

URL
detected URL: https://api-shakel-table.kaprylo.com/reset-password

XIOC detected URL: https://api-shakel-table.kaprylo.com/reset-password

extracted_from_files

URL
detected URL: https://api-shakel-table.kaprylo.com/signin

XIOC detected URL: https://api-shakel-table.kaprylo.com/signin

extracted_from_files

URL
detected URL: https://api-shakel-table.kaprylo.com/sign-up

XIOC detected URL: https://api-shakel-table.kaprylo.com/sign-up

extracted_from_files

URL
detected URL: https://api-shakel-table.kaprylo.com/deleteData

XIOC detected URL: https://api-shakel-table.kaprylo.com/deleteData

extracted_from_files

URL
detected URL: https://api-shakel-table.kaprylo.com/getData/$

XIOC detected URL: https://api-shakel-table.kaprylo.com/getData/$

extracted_from_files

URL
detected URL: https://api-shakel-table.kaprylo.com/saveData

XIOC detected URL: https://api-shakel-table.kaprylo.com/saveData

extracted_from_files

URL
detected URL: http://www.w3.org/1999/xlink

XIOC detected URL: http://www.w3.org/1999/xlink

extracted_from_files

URL
detected URL: http://www.w3.org/2000/svg%27

XIOC detected URL: http://www.w3.org/2000/svg%27

extracted_from_files

URL
detected URL: https://github.com/twbs/bootstrap/blob/main/LICENSE)

XIOC detected URL: https://github.com/twbs/bootstrap/blob/main/LICENSE)

extracted_from_files

URL
detected URL: https://shakelchat.com/api/send/whatsapp

XIOC detected URL: https://shakelchat.com/api/send/whatsapp

extracted_from_files

URL
detected URL: https://seftsms.com/services/send.php?key=$

XIOC detected URL: https://seftsms.com/services/send.php?key=$

extracted_from_files

URL
detected URL: https://seftsms.com/services/send.php?key=

XIOC detected URL: https://seftsms.com/services/send.php?key=

extracted_from_files

URL
detected URL: https://script.googleapis.com/v1/projects/$

XIOC detected URL: https://script.googleapis.com/v1/projects/$

extracted_from_files

URL
detected URL: https://script.google.com/home/usersettings

XIOC detected URL: https://script.google.com/home/usersettings

extracted_from_files

URL
detected URL: https://script.googleapis.com/v1/projects/

XIOC detected URL: https://script.googleapis.com/v1/projects/

extracted_from_files

URL
detected URL: https://script.googleapis.com/v1/projects

XIOC detected URL: https://script.googleapis.com/v1/projects

extracted_from_files

URL
detected URL: http://www.shakeltable.com/

XIOC detected URL: http://www.shakeltable.com/

extracted_from_files

URL
detected URL: https://www.shakeltable.com/p/shakeltable-dashborad-wa.html?apiKey=$

XIOC detected URL: https://www.shakeltable.com/p/shakeltable-dashborad-wa.html?apiKey=$

extracted_from_files

URL
detected URL: https://www.googleapis.com/auth/spreadsheets

XIOC detected URL: https://www.googleapis.com/auth/spreadsheets

extracted_from_files

URL
detected URL: https://www.googleapis.com/auth/script.projects

XIOC detected URL: https://www.googleapis.com/auth/script.projects

extracted_from_files

URL
detected URL: https://www.googleapis.com/auth/drive.file

XIOC detected URL: https://www.googleapis.com/auth/drive.file

extracted_from_files

URL
detected URL: https://clients2.google.com/service/update2/crx

XIOC detected URL: https://clients2.google.com/service/update2/crx

extracted_from_files

Domain
detected Domain: e.labels.map

XIOC detected Domain: e.labels.map

extracted_from_files

Domain
detected Domain: h.center

XIOC detected Domain: h.center

extracted_from_files

Domain
detected Domain: c.effect.run

XIOC detected Domain: c.effect.run

extracted_from_files

Domain
detected Domain: e.data

XIOC detected Domain: e.data

extracted_from_files

Security Analysis Summary

Security Analysis Overview

Shakel-Table is a Chrome Web Store extension published by [email protected]. Version 2.4.3 has been analyzed by the Risky Plugins security platform, receiving a risk score of 64.93/100 (MEDIUM risk) based on 471 security findings.

Risk Assessment

This extension presents high security risk. Significant concerns were identified during analysis. It is not recommended for use in sensitive or production environments without thorough review.

Findings Breakdown

  • High: 63 finding(s)
  • Medium: 408 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

Shakel-Table is published by [email protected] on the Chrome Web Store marketplace. The extension has approximately 247 users.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions