Is "SumBuddy - Browser AI Assistant" on Firefox Add-ons Safe to Install?

Randynamic Studio · firefox · v0.6.2

Introducing Your Personal Browser AI Assistant 🌟 Features: 🚀 No login required for basic functionality 🤖 Use your own AI models ✨ Customize your summary assistant prompts 💬 Engage freely with webpage content or YouTube video captions 🔒 Runs directly in your browser, ensuring your privacy without any server involvement Discover the ultimate AI companion that truly belongs to you. Experience seamless interaction and enhanced productivity while keeping your data secure.

Risk Assessment

Pending
0
out of 100
MINIMAL

0 security findings detected across all analyzers

Firefox extension requesting 6 permissions

No Threats Detected

This extension passed all security checks

About This Extension

Introducing Your Personal Browser AI Assistant 🌟 Features: <ul><li>🚀 No login required for basic functionality</li><li>🤖 Use your own AI models</li><li>✨ Customize your summary assistant prompts</li><li>💬 Engage freely with webpage content or YouTube video captions</li><li>🔒 Runs directly in your browser, ensuring your privacy without any server involvement</li></ul> Discover the ultimate AI companion that truly belongs to you. Experience seamless interaction and enhanced productivity while keeping your data secure.

No Findings

All security checks passed

AI Security Report

AI Security Analysis: SumBuddy - Browser AI Assistant

Analysis generated: 2025-12-12T18:53:41+13:00
Model: gemini-3-pro-preview


Quick Facts

Property Value
UUID 99c14274-98ab-5838-9aa9-18e5a0048197
Type firefox
Version
Users 9
Risk Score 100.0/100 (CRITICAL)
Malware Detected ⚠️ Yes
Secrets Exposed ✅ No
Critical Vulns ✅ No

AI Analysis

Executive Summary

Do not install or authorize this extension. "SumBuddy - Browser AI Assistant" presents a CRITICAL security risk (Score: 100/100). The analysis detects multiple high-severity indicators associated with system compromise, including registry modification, system command execution, and obfuscated code—behaviors that violate standard browser extension sandboxing. With only 9 users and an unverified publisher, this extension exhibits characteristics of either a malicious payload dropper or a severely compromised development build.

Threat Assessment

The security posture of this extension is non-existent. The findings suggest the extension is attempting to perform actions well outside the scope of a legitimate browser AI assistant.

  • Sandbox Violation Indicators: The most alarming findings are postinstall_registry_modification and postinstall_system_command. Browser extensions are strictly sandboxed; they should not have the capability to modify the Windows Registry or execute shell commands directly. The presence of these signatures suggests the extension may contain a "Native Messaging Host" installer or a payload designed to break out of the browser environment.
  • Malware/Dropper Behavior: The combination of postinstall_file_download, postinstall_file_manipulation, and postinstall_environment_access is highly characteristic of "dropper" malware—code designed to download and install further malicious payloads after the initial extension installation.
  • Obfuscation: Multiple findings of postinstall_obfuscation indicate that the code has been intentionally hidden to impede analysis, a common tactic for concealing malicious logic.
  • Supply Chain/Architecture Anomaly: The sheer volume of findings (3,467) and the specific postinstall nomenclature of the YARA rules strongly suggest the developer may have improperly bundled a massive server-side dependency tree (like an entire node_modules directory) or a build environment into the extension. While this could be gross negligence, the specific signatures triggered (crypto operations, registry mods) make it too dangerous to distinguish from active malice without deep manual reverse engineering.

Risk Justification

The 100/100 (CRITICAL) risk score is fully justified and potentially conservative given the findings:

  1. Severity of Capabilities: The identified signatures (Registry modification, System Command execution) represent a complete compromise of the host operating system, not just the browser session.
  2. Volume of Indicators: 462 High-Severity malware signatures is an exceptionally high number, indicating pervasive issues throughout the codebase.
  3. Lack of Trust: The publisher is unverified, and the user count is negligible (9), meaning there is no "herd immunity" or community vetting.
  4. Obfuscation: The presence of obfuscation negates the ability to easily verify benign intent.

Key Findings

  • System Integrity Threats:
    • Registry Modification: Code identified that attempts to write to the system registry, potentially to establish persistence (start with Windows).
    • System Command Execution: Signatures matching code that spawns shell commands, allowing for arbitrary code execution on the host machine.
  • Data Security Risks:
    • Crypto Operations: Unexplained cryptographic functions found, often used by ransomware or for encrypting C2 (Command and Control) traffic.
    • Environment Access: Code attempts to read system environment variables, which often contain sensitive API keys or system paths.
  • Malware Characteristics:
    • Obfuscation: Code logic is deliberately obscured.
    • File Manipulation/Download: Capabilities to download external files and modify local files, typical of malware droppers.

Recommendations

  1. Immediate Block: Blacklist 99c14274-98ab-5838-9aa9-18e5a0048197 in all enterprise browser management policies (GPO, Intune, Chrome/Firefox Enterprise).
  2. Incident Response: If this extension is found on any endpoint:
    • Isolate the machine from the network immediately.
    • Assume the host system (not just the browser) is compromised due to the registry/system command findings.
    • Perform a full forensic scan for persistence mechanisms (scheduled tasks, registry run keys).
  3. Network Blocking: Monitor and block traffic to domains associated with "Randynamic Studio" if identifiable, though specific domains were not provided in the summary.
  4. User Education: Advise users against installing extensions from unverified publishers with low user counts, specifically "AI" tools which are currently a popular lure for malware.

Mitigation Strategies

There are no safe mitigation strategies for using this extension.
Due to the presence of Remote Code Execution (RCE) and Registry Modification indicators, the risk cannot be mitigated by restricting permissions within the browser. The code appears to contain logic intended to bypass the browser sandbox entirely. The only safe course of action is removal.

Confidence Assessment

Confidence Level: High (80-90%)
While automated scanners can generate false positives (e.g., a developer accidentally including a build tool that can modify the registry but isn't used to), the convergence of obfuscation, registry modification, and system command execution in a high-risk category ("AI Assistant") from an unverified publisher creates a distinct pattern of malicious intent. Even if this is a case of extreme developer incompetence (bundling dangerous libraries), the attack surface it opens is identical to that of a malicious tool.


Disclaimer

This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.

Frequently Asked Questions