Is "复制标题Title和链接URL" on Chrome Web Store Safe to Install?
# 复制标题Title和链接URL 轻松实现浏览器复制标题和复制URL,清晰直观 copy title and copy url so easy ## 支持一下三种扩展方式 - 复制标题+链接 - 复制标题 - 复制连接 ## 可选项配置,自定义标题和链接
Risk Assessment
Analyzed165 security findings detected across all analyzers
Chrome extension requesting 4 permissions
Severity Breakdown
Finding Categories
YARA Rules Matched
8 rules(21 hits)Requested Permissions
4 permissionsAbout This Extension
Detailed Findings
24 totalYARA Rule Matches
8 rulesIndicators of Compromise
Network indicators, suspicious strings, and potential IoCs extracted during analysis
All Indicators · 132
detected IP: :: XIOC detected IP: ::
extracted_from_files
detected Domain: v.now XIOC detected Domain: v.now
extracted_from_files
detected URL: https://example.com XIOC detected URL: https://example.com
extracted_from_files
detected URL: https://mui.com/production-error/?code=$ XIOC detected URL: https://mui.com/production-error/?code=$
extracted_from_files
detected URL: http://www.w3.org/2000/svg XIOC detected URL: http://www.w3.org/2000/svg
extracted_from_files
detected URL: http://www.w3.org/1999/xlink XIOC detected URL: http://www.w3.org/1999/xlink
extracted_from_files
detected URL: https://clients2.google.com/service/update2/crx XIOC detected URL: https://clients2.google.com/service/update2/crx
extracted_from_files
detected URL: http://www.w3.org/1998/Math/MathML XIOC detected URL: http://www.w3.org/1998/Math/MathML
extracted_from_files
detected URL: http://www.w3.org/2000/svg'%3e%3cpath%20d='M%20737.01%20736.911%20C%20737.01%20678.236%20764.861%20631.584%20810.593%20611.455%20C%20856.348%20591.328%20907.915%20602.151%20947.752%20638.471%20C%20960.533%20650.102%20971.7%20655.694%20983.37%20650.253%20C%20995.344%20644.66%20997.302%20624.163%20997.302%20611.423%20L%20997.302%20392.795%20C%20997.302%20363.576%20975.601%20342.696%20946.365%20342.696%20L%20731.973%20342.696%20C%20660.472%20342.696%20644.538%20282.455%20681.12%20241.018%20C%20741.347%20172.79%20709.081%2067.292%20599.496%2062.714%20C%20489.923%2067.276%20457.668%20172.603%20517.886%20240.835%20C%20554.463%20282.291%20538.543%20342.692%20467.042%20342.692%20L%20255.813%20342.692%20C%20226.593%20342.692%20202.699%20363.572%20202.699%20392.792%20L%20202.699%201083.335%20C%20202.699%201112.559%20226.594%201137.287%20255.813%201137.287%20L%20946.355%201137.287%20C%20975.592%201137.287%20997.293%201112.559%20997.293%201083.335%20L%20997.293%20866.134%20C%20997.293%20853.393%20994.377%20831.952%20982.17%20826.265%20C%20970.045%20820.619%20955.743%20826.511%20942.823%20838.293%20C%20903.146%20874.487%20854.555%20884.556%20809.295%20864.635%20C%20763.798%20844.598%20737.001%20797.483%20737.001%20738.631%20L%20737.01%20736.911%20Z'%20style='fill:%20rgb(242,%20186,%20228);'/%3e%3c/svg%3e XIOC detected URL: http://www.w3.org/2000/svg'%3e%3cpath%20d='M%20737.01%20736.911%20C%20737.01%20678.236%20764.861%20631.584%20810.593%20611.455%20C%20856.348%20591.328%20907.915%20602.151%20947.752%20638.471%20C%20960.533%20650.102%20971.7%20655.694%20983.37%20650.253%20C%20995.344%20644.66%20997.302%20624.163%20997.302%20611.423%20L%20997.302%20392.795%20C%20997.302%20363.576%20975.601%20342.696%20946.365%20342.696%20L%20731.973%20342.696%20C%20660.472%20342.696%20644.538%20282.455%20681.12%20241.018%20C%20741.347%20172.79%20709.081%2067.292%20599.496%2062.714%20C%20489.923%2067.276%20457.668%20172.603%20517.886%20240.835%20C%20554.463%20282.291%20538.543%20342.692%20467.042%20342.692%20L%20255.813%20342.692%20C%20226.593%20342.692%20202.699%20363.572%20202.699%20392.792%20L%20202.699%201083.335%20C%20202.699%201112.559%20226.594%201137.287%20255.813%201137.287%20L%20946.355%201137.287%20C%20975.592%201137.287%20997.293%201112.559%20997.293%201083.335%20L%20997.293%20866.134%20C%20997.293%20853.393%20994.377%20831.952%20982.17%20826.265%20C%20970.045%20820.619%20955.743%20826.511%20942.823%20838.293%20C%20903.146%20874.487%20854.555%20884.556%20809.295%20864.635%20C%20763.798%20844.598%20737.001%20797.483%20737.001%20738.631%20L%20737.01%20736.911%20Z'%20style='fill:%20rgb(242,%20186,%20228);'/%3e%3c/svg%3e
extracted_from_files
detected URL: https://github.com/crxjs/create-crxjs XIOC detected URL: https://github.com/crxjs/create-crxjs
extracted_from_files
detected URL: https://vite.dev XIOC detected URL: https://vite.dev
extracted_from_files
detected URL: https://reactjs.org/ XIOC detected URL: https://reactjs.org/
extracted_from_files
detected URL: https://react.dev/errors/ XIOC detected URL: https://react.dev/errors/
extracted_from_files
detected Domain: t.circle XIOC detected Domain: t.circle
extracted_from_files
detected Domain: h.circle XIOC detected Domain: h.circle
extracted_from_files
detected Domain: h.target XIOC detected Domain: h.target
extracted_from_files
detected Domain: i.props.style XIOC detected Domain: i.props.style
extracted_from_files
detected Domain: e.vars.palette.snackbarcontent.bg XIOC detected Domain: e.vars.palette.snackbarcontent.bg
extracted_from_files
detected Domain: clients2.google.com XIOC detected Domain: clients2.google.com
extracted_from_files
detected URL: https://svgtopng.com/ XIOC detected URL: https://svgtopng.com/
extracted_from_files
detected Domain: u.props.in XIOC detected Domain: u.props.in
extracted_from_files
detected Domain: f.style XIOC detected Domain: f.style
extracted_from_files
detected Domain: d.style XIOC detected Domain: d.style
extracted_from_files
detected Domain: g.style XIOC detected Domain: g.style
extracted_from_files
detected Domain: i-m.top XIOC detected Domain: i-m.top
extracted_from_files
detected Domain: z.target XIOC detected Domain: z.target
extracted_from_files
detected Domain: j.to XIOC detected Domain: j.to
extracted_from_files
detected Domain: t.target XIOC detected Domain: t.target
extracted_from_files
detected Domain: e.info XIOC detected Domain: e.info
extracted_from_files
detected Domain: n.in XIOC detected Domain: n.in
extracted_from_files
detected Domain: o.in XIOC detected Domain: o.in
extracted_from_files
detected Domain: this.props.in XIOC detected Domain: this.props.in
extracted_from_files
detected Domain: i.in XIOC detected Domain: i.in
extracted_from_files
detected Domain: s.children.map XIOC detected Domain: s.children.map
extracted_from_files
detected Domain: n.map XIOC detected Domain: n.map
extracted_from_files
detected Domain: o.style XIOC detected Domain: o.style
extracted_from_files
detected Domain: a.style XIOC detected Domain: a.style
extracted_from_files
detected Domain: r.style XIOC detected Domain: r.style
extracted_from_files
detected Domain: w.map XIOC detected Domain: w.map
extracted_from_files
detected Domain: t.style XIOC detected Domain: t.style
extracted_from_files
detected Domain: r.map XIOC detected Domain: r.map
extracted_from_files
detected Domain: s.name XIOC detected Domain: s.name
extracted_from_files
detected Domain: this.name XIOC detected Domain: this.name
extracted_from_files
detected Domain: r.target XIOC detected Domain: r.target
extracted_from_files
detected Domain: v.as XIOC detected Domain: v.as
extracted_from_files
detected Domain: n.name XIOC detected Domain: n.name
extracted_from_files
detected Domain: o.map XIOC detected Domain: o.map
extracted_from_files
detected Domain: e.gap XIOC detected Domain: e.gap
extracted_from_files
detected Domain: hasownproperty.call XIOC detected Domain: hasownproperty.call
extracted_from_files
detected Domain: e.map XIOC detected Domain: e.map
extracted_from_files
detected Domain: array.prototype.foreach.call XIOC detected Domain: array.prototype.foreach.call
extracted_from_files
detected Domain: x.name XIOC detected Domain: x.name
extracted_from_files
detected Domain: r.name XIOC detected Domain: r.name
extracted_from_files
detected Domain: o.name XIOC detected Domain: o.name
extracted_from_files
detected Domain: wr.call XIOC detected Domain: wr.call
extracted_from_files
detected Domain: this.next XIOC detected Domain: this.next
extracted_from_files
detected Domain: github.com XIOC detected Domain: github.com
extracted_from_files
detected Domain: reactjs.org XIOC detected Domain: reactjs.org
extracted_from_files
detected Domain: crxjs.dev XIOC detected Domain: crxjs.dev
extracted_from_files
detected Domain: vite.dev XIOC detected Domain: vite.dev
extracted_from_files
detected Domain: example.com XIOC detected Domain: example.com
extracted_from_files
detected Domain: mui.com XIOC detected Domain: mui.com
extracted_from_files
detected URL: https://crxjs.dev/vite-plugin XIOC detected URL: https://crxjs.dev/vite-plugin
extracted_from_files
detected Domain: x.data XIOC detected Domain: x.data
extracted_from_files
detected Domain: e.target XIOC detected Domain: e.target
extracted_from_files
detected Domain: n.data XIOC detected Domain: n.data
extracted_from_files
detected Domain: t.as XIOC detected Domain: t.as
extracted_from_files
detected Domain: u.media XIOC detected Domain: u.media
extracted_from_files
detected Domain: zn.call XIOC detected Domain: zn.call
extracted_from_files
detected Domain: n.style XIOC detected Domain: n.style
extracted_from_files
detected Domain: i.memoizedprops.style XIOC detected Domain: i.memoizedprops.style
extracted_from_files
detected Domain: n.id XIOC detected Domain: n.id
extracted_from_files
detected Domain: b.top XIOC detected Domain: b.top
extracted_from_files
detected Domain: da.next XIOC detected Domain: da.next
extracted_from_files
detected Domain: o.target XIOC detected Domain: o.target
extracted_from_files
detected Domain: q.target XIOC detected Domain: q.target
extracted_from_files
detected Domain: d.call XIOC detected Domain: d.call
extracted_from_files
detected Domain: u.data XIOC detected Domain: u.data
extracted_from_files
detected Domain: u.compare XIOC detected Domain: u.compare
extracted_from_files
detected Domain: c.data XIOC detected Domain: c.data
extracted_from_files
detected Domain: l.id XIOC detected Domain: l.id
extracted_from_files
detected Domain: a.is XIOC detected Domain: a.is
extracted_from_files
detected Domain: u.property XIOC detected Domain: u.property
extracted_from_files
detected Domain: ml.next XIOC detected Domain: ml.next
extracted_from_files
detected Domain: a.data.map XIOC detected Domain: a.data.map
extracted_from_files
detected Domain: h.next XIOC detected Domain: h.next
extracted_from_files
detected Domain: a.next XIOC detected Domain: a.next
extracted_from_files
detected Domain: e.data XIOC detected Domain: e.data
extracted_from_files
detected Domain: object.prototype.tostring.call XIOC detected Domain: object.prototype.tostring.call
extracted_from_files
detected Domain: d.next XIOC detected Domain: d.next
extracted_from_files
detected Domain: t.next XIOC detected Domain: t.next
extracted_from_files
detected Domain: n.next XIOC detected Domain: n.next
extracted_from_files
detected Domain: u.next XIOC detected Domain: u.next
extracted_from_files
detected Domain: i.next XIOC detected Domain: i.next
extracted_from_files
detected Domain: b.call XIOC detected Domain: b.call
extracted_from_files
detected Domain: m.next XIOC detected Domain: m.next
extracted_from_files
detected Domain: n.events XIOC detected Domain: n.events
extracted_from_files
detected Domain: y.data XIOC detected Domain: y.data
extracted_from_files
detected Domain: e.next XIOC detected Domain: e.next
extracted_from_files
detected Domain: f.next XIOC detected Domain: f.next
extracted_from_files
detected Domain: a.name XIOC detected Domain: a.name
extracted_from_files
detected Domain: c.next XIOC detected Domain: c.next
extracted_from_files
detected Domain: l.next XIOC detected Domain: l.next
extracted_from_files
detected Domain: rt.next XIOC detected Domain: rt.next
extracted_from_files
detected Domain: u.name XIOC detected Domain: u.name
extracted_from_files
detected Domain: e.name XIOC detected Domain: e.name
extracted_from_files
detected Domain: this.target XIOC detected Domain: this.target
extracted_from_files
detected Domain: date.now XIOC detected Domain: date.now
extracted_from_files
detected Domain: l.data XIOC detected Domain: l.data
extracted_from_files
detected Domain: t.data XIOC detected Domain: t.data
extracted_from_files
detected Domain: object.is XIOC detected Domain: object.is
extracted_from_files
detected Domain: t.name XIOC detected Domain: t.name
extracted_from_files
detected Domain: yn.call XIOC detected Domain: yn.call
extracted_from_files
detected Domain: t.call XIOC detected Domain: t.call
extracted_from_files
detected Domain: l.call XIOC detected Domain: l.call
extracted_from_files
detected Domain: n.call XIOC detected Domain: n.call
extracted_from_files
detected Domain: l.style XIOC detected Domain: l.style
extracted_from_files
detected Domain: l.target XIOC detected Domain: l.target
extracted_from_files
detected Domain: dl.now XIOC detected Domain: dl.now
extracted_from_files
detected Domain: cl.call XIOC detected Domain: cl.call
extracted_from_files
detected Domain: s.next XIOC detected Domain: s.next
extracted_from_files
detected Domain: e.call XIOC detected Domain: e.call
extracted_from_files
detected Domain: a.as XIOC detected Domain: a.as
extracted_from_files
detected Domain: a.media XIOC detected Domain: a.media
extracted_from_files
detected Domain: l.name XIOC detected Domain: l.name
extracted_from_files
detected Domain: svgtopng.com XIOC detected Domain: svgtopng.com
extracted_from_files
detected Domain: react.dev XIOC detected Domain: react.dev
extracted_from_files
detected Domain: www.w3.org XIOC detected Domain: www.w3.org
extracted_from_files
detected Domain: object.prototype.hasownproperty.call XIOC detected Domain: object.prototype.hasownproperty.call
extracted_from_files
detected Domain: g.id-o.id XIOC detected Domain: g.id-o.id
extracted_from_files
detected Domain: performance.now XIOC detected Domain: performance.now
extracted_from_files
detected Domain: t.map XIOC detected Domain: t.map
extracted_from_files
Security Analysis Summary
Security Analysis Overview
复制标题Title和链接URL is a Chrome Web Store extension published by [email protected]. Version 1.2.1 has been analyzed by the Risky Plugins security platform, receiving a risk score of 62.21/100 (MEDIUM risk) based on 165 security findings.
Risk Assessment
This extension presents high security risk. Significant concerns were identified during analysis. It is not recommended for use in sensitive or production environments without thorough review.
Findings Breakdown
- High: 21 finding(s)
- Medium: 144 finding(s)
What Was Analyzed
The security assessment covers multiple analysis categories:
- Malware Detection: YARA rule matching against 2,400+ malware signatures
- Secret Detection: Scanning for exposed API keys, tokens, and credentials
- Static Analysis: Code-level security analysis for common vulnerability patterns
- Network Analysis: Detection of suspicious network communications and endpoints
- Obfuscation Detection: Identification of code obfuscation techniques
Developer Information
复制标题Title和链接URL is published by [email protected] on the Chrome Web Store marketplace. The extension has approximately 15 users.
Recommendation
This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace