Is "SumBuddy - Browser AI Assistant" on Firefox Add-ons Safe to Install?
Introducing Your Personal Browser AI Assistant 🌟 Features: 🚀 No login required for basic functionality 🤖 Use your own AI models ✨ Customize your summary assistant prompts 💬 Engage freely with webpage content or YouTube video captions 🔒 Runs directly in your browser, ensuring your privacy without any server involvement Discover the ultimate AI companion that truly belongs to you. Experience seamless interaction and enhanced productivity while keeping your data secure.
Risk Assessment
Pending0 security findings detected across all analyzers
Firefox extension requesting 6 permissions
No Threats Detected
This extension passed all security checks
About This Extension
No Findings
All security checks passed
AI Security Report
AI Security Analysis: SumBuddy - Browser AI Assistant
Analysis generated: 2025-12-12T18:53:41+13:00
Model: gemini-3-pro-preview
Quick Facts
| Property | Value |
|---|---|
| UUID | 99c14274-98ab-5838-9aa9-18e5a0048197 |
| Type | firefox |
| Version | |
| Users | 9 |
| Risk Score | 100.0/100 (CRITICAL) |
| Malware Detected | ⚠️ Yes |
| Secrets Exposed | ✅ No |
| Critical Vulns | ✅ No |
AI Analysis
Executive Summary
Do not install or authorize this extension. "SumBuddy - Browser AI Assistant" presents a CRITICAL security risk (Score: 100/100). The analysis detects multiple high-severity indicators associated with system compromise, including registry modification, system command execution, and obfuscated code—behaviors that violate standard browser extension sandboxing. With only 9 users and an unverified publisher, this extension exhibits characteristics of either a malicious payload dropper or a severely compromised development build.
Threat Assessment
The security posture of this extension is non-existent. The findings suggest the extension is attempting to perform actions well outside the scope of a legitimate browser AI assistant.
- Sandbox Violation Indicators: The most alarming findings are
postinstall_registry_modificationandpostinstall_system_command. Browser extensions are strictly sandboxed; they should not have the capability to modify the Windows Registry or execute shell commands directly. The presence of these signatures suggests the extension may contain a "Native Messaging Host" installer or a payload designed to break out of the browser environment. - Malware/Dropper Behavior: The combination of
postinstall_file_download,postinstall_file_manipulation, andpostinstall_environment_accessis highly characteristic of "dropper" malware—code designed to download and install further malicious payloads after the initial extension installation. - Obfuscation: Multiple findings of
postinstall_obfuscationindicate that the code has been intentionally hidden to impede analysis, a common tactic for concealing malicious logic. - Supply Chain/Architecture Anomaly: The sheer volume of findings (3,467) and the specific
postinstallnomenclature of the YARA rules strongly suggest the developer may have improperly bundled a massive server-side dependency tree (like an entirenode_modulesdirectory) or a build environment into the extension. While this could be gross negligence, the specific signatures triggered (crypto operations, registry mods) make it too dangerous to distinguish from active malice without deep manual reverse engineering.
Risk Justification
The 100/100 (CRITICAL) risk score is fully justified and potentially conservative given the findings:
- Severity of Capabilities: The identified signatures (Registry modification, System Command execution) represent a complete compromise of the host operating system, not just the browser session.
- Volume of Indicators: 462 High-Severity malware signatures is an exceptionally high number, indicating pervasive issues throughout the codebase.
- Lack of Trust: The publisher is unverified, and the user count is negligible (9), meaning there is no "herd immunity" or community vetting.
- Obfuscation: The presence of obfuscation negates the ability to easily verify benign intent.
Key Findings
- System Integrity Threats:
- Registry Modification: Code identified that attempts to write to the system registry, potentially to establish persistence (start with Windows).
- System Command Execution: Signatures matching code that spawns shell commands, allowing for arbitrary code execution on the host machine.
- Data Security Risks:
- Crypto Operations: Unexplained cryptographic functions found, often used by ransomware or for encrypting C2 (Command and Control) traffic.
- Environment Access: Code attempts to read system environment variables, which often contain sensitive API keys or system paths.
- Malware Characteristics:
- Obfuscation: Code logic is deliberately obscured.
- File Manipulation/Download: Capabilities to download external files and modify local files, typical of malware droppers.
Recommendations
- Immediate Block: Blacklist
99c14274-98ab-5838-9aa9-18e5a0048197in all enterprise browser management policies (GPO, Intune, Chrome/Firefox Enterprise). - Incident Response: If this extension is found on any endpoint:
- Isolate the machine from the network immediately.
- Assume the host system (not just the browser) is compromised due to the registry/system command findings.
- Perform a full forensic scan for persistence mechanisms (scheduled tasks, registry run keys).
- Network Blocking: Monitor and block traffic to domains associated with "Randynamic Studio" if identifiable, though specific domains were not provided in the summary.
- User Education: Advise users against installing extensions from unverified publishers with low user counts, specifically "AI" tools which are currently a popular lure for malware.
Mitigation Strategies
There are no safe mitigation strategies for using this extension.
Due to the presence of Remote Code Execution (RCE) and Registry Modification indicators, the risk cannot be mitigated by restricting permissions within the browser. The code appears to contain logic intended to bypass the browser sandbox entirely. The only safe course of action is removal.
Confidence Assessment
Confidence Level: High (80-90%)
While automated scanners can generate false positives (e.g., a developer accidentally including a build tool that can modify the registry but isn't used to), the convergence of obfuscation, registry modification, and system command execution in a high-risk category ("AI Assistant") from an unverified publisher creates a distinct pattern of malicious intent. Even if this is a case of extreme developer incompetence (bundling dangerous libraries), the attack surface it opens is identical to that of a malicious tool.
Disclaimer
This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace