Is "复制标题Title和链接URL" on Chrome Web Store Safe to Install?

[email protected] · chrome · v1.2.1

# 复制标题Title和链接URL 轻松实现浏览器复制标题和复制URL,清晰直观 copy title and copy url so easy ## 支持一下三种扩展方式 - 复制标题+链接 - 复制标题 - 复制连接 ## 可选项配置,自定义标题和链接

Risk Assessment

Analyzed
62.21
out of 100
MEDIUM

165 security findings detected across all analyzers

Chrome extension requesting 4 permissions

Severity Breakdown

0
Critical
21
High
144
Medium
0
Low
0
Info

Finding Categories

21
Malware Signatures
2
Network
132
IoC Indicators

YARA Rules Matched

8 rules(21 hits)
postinstall system command postinstall network communication postinstall file download postinstall environment access NoUseWeakRandom postinstall crypto operations postinstall obfuscation postinstall file manipulation

Requested Permissions

4 permissions
activeTab
Medium
tabs
Medium
sidePanel
Low
storage
Low

About This Extension

# 复制标题Title和链接URL 轻松实现浏览器复制标题和复制URL,清晰直观 copy title and copy url so easy ## 支持一下三种扩展方式 - 复制标题+链接 - 复制标题 - 复制连接 ## 可选项配置,自定义标题和链接

Detailed Findings

24 total

YARA Rule Matches

8 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
13
IP Addresses
1
Domains
118
Strings
132

All Indicators · 132

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

Domain
detected Domain: v.now

XIOC detected Domain: v.now

extracted_from_files

URL
detected URL: https://example.com

XIOC detected URL: https://example.com

extracted_from_files

URL
detected URL: https://mui.com/production-error/?code=$

XIOC detected URL: https://mui.com/production-error/?code=$

extracted_from_files

URL
detected URL: http://www.w3.org/2000/svg

XIOC detected URL: http://www.w3.org/2000/svg

extracted_from_files

URL
detected URL: http://www.w3.org/1999/xlink

XIOC detected URL: http://www.w3.org/1999/xlink

extracted_from_files

URL
detected URL: https://clients2.google.com/service/update2/crx

XIOC detected URL: https://clients2.google.com/service/update2/crx

extracted_from_files

URL
detected URL: http://www.w3.org/1998/Math/MathML

XIOC detected URL: http://www.w3.org/1998/Math/MathML

extracted_from_files

URL
detected URL: http://www.w3.org/2000/svg'%3e%3cpath%20d='M%20737.01%20736.911%20C%20737.01%20678.236%20764.861%20631.584%20810.593%20611.455%20C%20856.348%20591.328%20907.915%20602.151%20947.752%20638.471%20C%20960.533%20650.102%20971.7%20655.694%20983.37%20650.253%20C%20995.344%20644.66%20997.302%20624.163%20997.302%20611.423%20L%20997.302%20392.795%20C%20997.302%20363.576%20975.601%20342.696%20946.365%20342.696%20L%20731.973%20342.696%20C%20660.472%20342.696%20644.538%20282.455%20681.12%20241.018%20C%20741.347%20172.79%20709.081%2067.292%20599.496%2062.714%20C%20489.923%2067.276%20457.668%20172.603%20517.886%20240.835%20C%20554.463%20282.291%20538.543%20342.692%20467.042%20342.692%20L%20255.813%20342.692%20C%20226.593%20342.692%20202.699%20363.572%20202.699%20392.792%20L%20202.699%201083.335%20C%20202.699%201112.559%20226.594%201137.287%20255.813%201137.287%20L%20946.355%201137.287%20C%20975.592%201137.287%20997.293%201112.559%20997.293%201083.335%20L%20997.293%20866.134%20C%20997.293%20853.393%20994.377%20831.952%20982.17%20826.265%20C%20970.045%20820.619%20955.743%20826.511%20942.823%20838.293%20C%20903.146%20874.487%20854.555%20884.556%20809.295%20864.635%20C%20763.798%20844.598%20737.001%20797.483%20737.001%20738.631%20L%20737.01%20736.911%20Z'%20style='fill:%20rgb(242,%20186,%20228);'/%3e%3c/svg%3e

XIOC detected URL: http://www.w3.org/2000/svg'%3e%3cpath%20d='M%20737.01%20736.911%20C%20737.01%20678.236%20764.861%20631.584%20810.593%20611.455%20C%20856.348%20591.328%20907.915%20602.151%20947.752%20638.471%20C%20960.533%20650.102%20971.7%20655.694%20983.37%20650.253%20C%20995.344%20644.66%20997.302%20624.163%20997.302%20611.423%20L%20997.302%20392.795%20C%20997.302%20363.576%20975.601%20342.696%20946.365%20342.696%20L%20731.973%20342.696%20C%20660.472%20342.696%20644.538%20282.455%20681.12%20241.018%20C%20741.347%20172.79%20709.081%2067.292%20599.496%2062.714%20C%20489.923%2067.276%20457.668%20172.603%20517.886%20240.835%20C%20554.463%20282.291%20538.543%20342.692%20467.042%20342.692%20L%20255.813%20342.692%20C%20226.593%20342.692%20202.699%20363.572%20202.699%20392.792%20L%20202.699%201083.335%20C%20202.699%201112.559%20226.594%201137.287%20255.813%201137.287%20L%20946.355%201137.287%20C%20975.592%201137.287%20997.293%201112.559%20997.293%201083.335%20L%20997.293%20866.134%20C%20997.293%20853.393%20994.377%20831.952%20982.17%20826.265%20C%20970.045%20820.619%20955.743%20826.511%20942.823%20838.293%20C%20903.146%20874.487%20854.555%20884.556%20809.295%20864.635%20C%20763.798%20844.598%20737.001%20797.483%20737.001%20738.631%20L%20737.01%20736.911%20Z'%20style='fill:%20rgb(242,%20186,%20228);'/%3e%3c/svg%3e

extracted_from_files

URL
detected URL: https://github.com/crxjs/create-crxjs

XIOC detected URL: https://github.com/crxjs/create-crxjs

extracted_from_files

URL
detected URL: https://vite.dev

XIOC detected URL: https://vite.dev

extracted_from_files

URL
detected URL: https://reactjs.org/

XIOC detected URL: https://reactjs.org/

extracted_from_files

URL
detected URL: https://react.dev/errors/

XIOC detected URL: https://react.dev/errors/

extracted_from_files

Domain
detected Domain: t.circle

XIOC detected Domain: t.circle

extracted_from_files

Domain
detected Domain: h.circle

XIOC detected Domain: h.circle

extracted_from_files

Domain
detected Domain: h.target

XIOC detected Domain: h.target

extracted_from_files

Domain
detected Domain: i.props.style

XIOC detected Domain: i.props.style

extracted_from_files

Domain
detected Domain: e.vars.palette.snackbarcontent.bg

XIOC detected Domain: e.vars.palette.snackbarcontent.bg

extracted_from_files

Domain
detected Domain: clients2.google.com

XIOC detected Domain: clients2.google.com

extracted_from_files

URL
detected URL: https://svgtopng.com/

XIOC detected URL: https://svgtopng.com/

extracted_from_files

Domain
detected Domain: u.props.in

XIOC detected Domain: u.props.in

extracted_from_files

Domain
detected Domain: f.style

XIOC detected Domain: f.style

extracted_from_files

Domain
detected Domain: d.style

XIOC detected Domain: d.style

extracted_from_files

Domain
detected Domain: g.style

XIOC detected Domain: g.style

extracted_from_files

Domain
detected Domain: i-m.top

XIOC detected Domain: i-m.top

extracted_from_files

Domain
detected Domain: z.target

XIOC detected Domain: z.target

extracted_from_files

Domain
detected Domain: j.to

XIOC detected Domain: j.to

extracted_from_files

Domain
detected Domain: t.target

XIOC detected Domain: t.target

extracted_from_files

Domain
detected Domain: e.info

XIOC detected Domain: e.info

extracted_from_files

Domain
detected Domain: n.in

XIOC detected Domain: n.in

extracted_from_files

Domain
detected Domain: o.in

XIOC detected Domain: o.in

extracted_from_files

Domain
detected Domain: this.props.in

XIOC detected Domain: this.props.in

extracted_from_files

Domain
detected Domain: i.in

XIOC detected Domain: i.in

extracted_from_files

Domain
detected Domain: s.children.map

XIOC detected Domain: s.children.map

extracted_from_files

Domain
detected Domain: n.map

XIOC detected Domain: n.map

extracted_from_files

Domain
detected Domain: o.style

XIOC detected Domain: o.style

extracted_from_files

Domain
detected Domain: a.style

XIOC detected Domain: a.style

extracted_from_files

Domain
detected Domain: r.style

XIOC detected Domain: r.style

extracted_from_files

Domain
detected Domain: w.map

XIOC detected Domain: w.map

extracted_from_files

Domain
detected Domain: t.style

XIOC detected Domain: t.style

extracted_from_files

Domain
detected Domain: r.map

XIOC detected Domain: r.map

extracted_from_files

Domain
detected Domain: s.name

XIOC detected Domain: s.name

extracted_from_files

Domain
detected Domain: this.name

XIOC detected Domain: this.name

extracted_from_files

Domain
detected Domain: r.target

XIOC detected Domain: r.target

extracted_from_files

Domain
detected Domain: v.as

XIOC detected Domain: v.as

extracted_from_files

Domain
detected Domain: n.name

XIOC detected Domain: n.name

extracted_from_files

Domain
detected Domain: o.map

XIOC detected Domain: o.map

extracted_from_files

Domain
detected Domain: e.gap

XIOC detected Domain: e.gap

extracted_from_files

Domain
detected Domain: hasownproperty.call

XIOC detected Domain: hasownproperty.call

extracted_from_files

Domain
detected Domain: e.map

XIOC detected Domain: e.map

extracted_from_files

Domain
detected Domain: array.prototype.foreach.call

XIOC detected Domain: array.prototype.foreach.call

extracted_from_files

Domain
detected Domain: x.name

XIOC detected Domain: x.name

extracted_from_files

Domain
detected Domain: r.name

XIOC detected Domain: r.name

extracted_from_files

Domain
detected Domain: o.name

XIOC detected Domain: o.name

extracted_from_files

Domain
detected Domain: wr.call

XIOC detected Domain: wr.call

extracted_from_files

Domain
detected Domain: this.next

XIOC detected Domain: this.next

extracted_from_files

Domain
detected Domain: github.com

XIOC detected Domain: github.com

extracted_from_files

Domain
detected Domain: reactjs.org

XIOC detected Domain: reactjs.org

extracted_from_files

Domain
detected Domain: crxjs.dev

XIOC detected Domain: crxjs.dev

extracted_from_files

Domain
detected Domain: vite.dev

XIOC detected Domain: vite.dev

extracted_from_files

Domain
detected Domain: example.com

XIOC detected Domain: example.com

extracted_from_files

Domain
detected Domain: mui.com

XIOC detected Domain: mui.com

extracted_from_files

URL
detected URL: https://crxjs.dev/vite-plugin

XIOC detected URL: https://crxjs.dev/vite-plugin

extracted_from_files

Domain
detected Domain: x.data

XIOC detected Domain: x.data

extracted_from_files

Domain
detected Domain: e.target

XIOC detected Domain: e.target

extracted_from_files

Domain
detected Domain: n.data

XIOC detected Domain: n.data

extracted_from_files

Domain
detected Domain: t.as

XIOC detected Domain: t.as

extracted_from_files

Domain
detected Domain: u.media

XIOC detected Domain: u.media

extracted_from_files

Domain
detected Domain: zn.call

XIOC detected Domain: zn.call

extracted_from_files

Domain
detected Domain: n.style

XIOC detected Domain: n.style

extracted_from_files

Domain
detected Domain: i.memoizedprops.style

XIOC detected Domain: i.memoizedprops.style

extracted_from_files

Domain
detected Domain: n.id

XIOC detected Domain: n.id

extracted_from_files

Domain
detected Domain: b.top

XIOC detected Domain: b.top

extracted_from_files

Domain
detected Domain: da.next

XIOC detected Domain: da.next

extracted_from_files

Domain
detected Domain: o.target

XIOC detected Domain: o.target

extracted_from_files

Domain
detected Domain: q.target

XIOC detected Domain: q.target

extracted_from_files

Domain
detected Domain: d.call

XIOC detected Domain: d.call

extracted_from_files

Domain
detected Domain: u.data

XIOC detected Domain: u.data

extracted_from_files

Domain
detected Domain: u.compare

XIOC detected Domain: u.compare

extracted_from_files

Domain
detected Domain: c.data

XIOC detected Domain: c.data

extracted_from_files

Domain
detected Domain: l.id

XIOC detected Domain: l.id

extracted_from_files

Domain
detected Domain: a.is

XIOC detected Domain: a.is

extracted_from_files

Domain
detected Domain: u.property

XIOC detected Domain: u.property

extracted_from_files

Domain
detected Domain: ml.next

XIOC detected Domain: ml.next

extracted_from_files

Domain
detected Domain: a.data.map

XIOC detected Domain: a.data.map

extracted_from_files

Domain
detected Domain: h.next

XIOC detected Domain: h.next

extracted_from_files

Domain
detected Domain: a.next

XIOC detected Domain: a.next

extracted_from_files

Domain
detected Domain: e.data

XIOC detected Domain: e.data

extracted_from_files

Domain
detected Domain: object.prototype.tostring.call

XIOC detected Domain: object.prototype.tostring.call

extracted_from_files

Domain
detected Domain: d.next

XIOC detected Domain: d.next

extracted_from_files

Domain
detected Domain: t.next

XIOC detected Domain: t.next

extracted_from_files

Domain
detected Domain: n.next

XIOC detected Domain: n.next

extracted_from_files

Domain
detected Domain: u.next

XIOC detected Domain: u.next

extracted_from_files

Domain
detected Domain: i.next

XIOC detected Domain: i.next

extracted_from_files

Domain
detected Domain: b.call

XIOC detected Domain: b.call

extracted_from_files

Domain
detected Domain: m.next

XIOC detected Domain: m.next

extracted_from_files

Domain
detected Domain: n.events

XIOC detected Domain: n.events

extracted_from_files

Domain
detected Domain: y.data

XIOC detected Domain: y.data

extracted_from_files

Domain
detected Domain: e.next

XIOC detected Domain: e.next

extracted_from_files

Domain
detected Domain: f.next

XIOC detected Domain: f.next

extracted_from_files

Domain
detected Domain: a.name

XIOC detected Domain: a.name

extracted_from_files

Domain
detected Domain: c.next

XIOC detected Domain: c.next

extracted_from_files

Domain
detected Domain: l.next

XIOC detected Domain: l.next

extracted_from_files

Domain
detected Domain: rt.next

XIOC detected Domain: rt.next

extracted_from_files

Domain
detected Domain: u.name

XIOC detected Domain: u.name

extracted_from_files

Domain
detected Domain: e.name

XIOC detected Domain: e.name

extracted_from_files

Domain
detected Domain: this.target

XIOC detected Domain: this.target

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: l.data

XIOC detected Domain: l.data

extracted_from_files

Domain
detected Domain: t.data

XIOC detected Domain: t.data

extracted_from_files

Domain
detected Domain: object.is

XIOC detected Domain: object.is

extracted_from_files

Domain
detected Domain: t.name

XIOC detected Domain: t.name

extracted_from_files

Domain
detected Domain: yn.call

XIOC detected Domain: yn.call

extracted_from_files

Domain
detected Domain: t.call

XIOC detected Domain: t.call

extracted_from_files

Domain
detected Domain: l.call

XIOC detected Domain: l.call

extracted_from_files

Domain
detected Domain: n.call

XIOC detected Domain: n.call

extracted_from_files

Domain
detected Domain: l.style

XIOC detected Domain: l.style

extracted_from_files

Domain
detected Domain: l.target

XIOC detected Domain: l.target

extracted_from_files

Domain
detected Domain: dl.now

XIOC detected Domain: dl.now

extracted_from_files

Domain
detected Domain: cl.call

XIOC detected Domain: cl.call

extracted_from_files

Domain
detected Domain: s.next

XIOC detected Domain: s.next

extracted_from_files

Domain
detected Domain: e.call

XIOC detected Domain: e.call

extracted_from_files

Domain
detected Domain: a.as

XIOC detected Domain: a.as

extracted_from_files

Domain
detected Domain: a.media

XIOC detected Domain: a.media

extracted_from_files

Domain
detected Domain: l.name

XIOC detected Domain: l.name

extracted_from_files

Domain
detected Domain: svgtopng.com

XIOC detected Domain: svgtopng.com

extracted_from_files

Domain
detected Domain: react.dev

XIOC detected Domain: react.dev

extracted_from_files

Domain
detected Domain: www.w3.org

XIOC detected Domain: www.w3.org

extracted_from_files

Domain
detected Domain: object.prototype.hasownproperty.call

XIOC detected Domain: object.prototype.hasownproperty.call

extracted_from_files

Domain
detected Domain: g.id-o.id

XIOC detected Domain: g.id-o.id

extracted_from_files

Domain
detected Domain: performance.now

XIOC detected Domain: performance.now

extracted_from_files

Domain
detected Domain: t.map

XIOC detected Domain: t.map

extracted_from_files

Security Analysis Summary

Security Analysis Overview

复制标题Title和链接URL is a Chrome Web Store extension published by [email protected]. Version 1.2.1 has been analyzed by the Risky Plugins security platform, receiving a risk score of 62.21/100 (MEDIUM risk) based on 165 security findings.

Risk Assessment

This extension presents high security risk. Significant concerns were identified during analysis. It is not recommended for use in sensitive or production environments without thorough review.

Findings Breakdown

  • High: 21 finding(s)
  • Medium: 144 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

复制标题Title和链接URL is published by [email protected] on the Chrome Web Store marketplace. The extension has approximately 15 users.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions