Is "ReactIn" on Chrome Web Store Safe to Install?

[email protected] · chrome · v1.2.0

We help B2B sales and marketing teams, who struggle with conversion rates, achieve higher conversion rates, thanks to personalized handwritten letter campaigns Data Collection: By syncing your account to ReactIn, we collect cookies. The following information may be collected: - Profile data (name, user ID, profile picture) - Cookies data for invitations and messages functionalities Transparency and Control We respect your privacy. You can access, modify, or delete your data at any time on app.reactin.io. For more details, please refer to our privacy policy.

Risk Assessment

Analyzed
66.72
out of 100
HIGH

49 security findings detected across all analyzers

Chrome extension requesting 6 permissions

Severity Breakdown

0
Critical
0
High
41
Medium
8
Low
0
Info

Finding Categories

4
Network
35
IoC Indicators

YARA Rules Matched

6 rules(8 hits)
postinstall network communication postinstall system command postinstall crypto operations postinstall file manipulation postinstall file download postinstall environment access

Requested Permissions

6 permissions
cookies

Read and modify cookies on all sites

High
tabs
Medium
*://*.vercel.app/
Low
*://*.reactin.io/
Low
*://*.linkedin.com/
Low
https://app.reactin.io/*
Low

About This Extension

We help B2B sales and marketing teams, who struggle with conversion rates, achieve higher conversion rates, thanks to personalized handwritten letter campaigns Data Collection: By syncing your account to ReactIn, we collect cookies. The following information may be collected: - Profile data (name, user ID, profile picture) - Cookies data for invitations and messages functionalities Transparency and Control We respect your privacy. You can access, modify, or delete your data at any time on app.reactin.io. For more details, please refer to our privacy policy.

Detailed Findings

13 total

YARA Rule Matches

6 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
10
IP Addresses
5
Domains
18
Strings
35

All Indicators · 35

Domain
detected Domain: vercel.app

XIOC detected Domain: vercel.app

extracted_from_files

URL
detected URL: https://www.linkedin.com/voyager/api/graphql?includeWebMetadata=true&variables=(profileEditFormType:TOP_CARD,profileFormEntryPoint:PROFILE_SECTION)&queryId=voyagerIdentityDashProfileEditFormPages.fc272a3c5ca81bd59300a90f7c360d9e

XIOC detected URL: https://www.linkedin.com/voyager/api/graphql?includeWebMetadata=true&variables=(profileEditFormType:TOP_CARD,profileFormEntryPoint:PROFILE_SECTION)&queryId=voyagerIdentityDashProfileEditFormPages.fc272a3c5ca81bd59300a90f7c360d9e

extracted_from_files

URL
detected URL: https://www.linkedin.com/voyager/api/identity/dash/profiles/$

XIOC detected URL: https://www.linkedin.com/voyager/api/identity/dash/profiles/$

extracted_from_files

URL
detected URL: https://www.linkedin.com/voyager/api/graphql?includeWebMetadata=true&variables=()&queryId=voyagerFeedDashGlobalNavs.998834f8daa4cbca25417843e04f16b1

XIOC detected URL: https://www.linkedin.com/voyager/api/graphql?includeWebMetadata=true&variables=()&queryId=voyagerFeedDashGlobalNavs.998834f8daa4cbca25417843e04f16b1

extracted_from_files

URL
detected URL: https://www.linkedin.com

XIOC detected URL: https://www.linkedin.com

extracted_from_files

URL
detected URL: https://fonts.googleapis.com/css2?family=Poppins:wght@400;500;600;700&display=swap');

XIOC detected URL: https://fonts.googleapis.com/css2?family=Poppins:wght@400;500;600;700&display=swap');

extracted_from_files

Hash
detected MD5 Hash: fc272a3c5ca81bd59300a90f7c360d9e

XIOC detected MD5 Hash: fc272a3c5ca81bd59300a90f7c360d9e

extracted_from_files

Hash
detected MD5 Hash: 998834f8daa4cbca25417843e04f16b1

XIOC detected MD5 Hash: 998834f8daa4cbca25417843e04f16b1

extracted_from_files

Domain
detected Domain: fonts.googleapis.com

XIOC detected Domain: fonts.googleapis.com

extracted_from_files

Domain
detected Domain: toast.info

XIOC detected Domain: toast.info

extracted_from_files

URL
detected URL: https://app.reactin.io/*

XIOC detected URL: https://app.reactin.io/*

extracted_from_files

URL
detected URL: http://www.w3.org/2000/svg

XIOC detected URL: http://www.w3.org/2000/svg

extracted_from_files

URL
detected URL: https://www.linkedin.com/

XIOC detected URL: https://www.linkedin.com/

extracted_from_files

URL
detected URL: https://app.reactin.io

XIOC detected URL: https://app.reactin.io

extracted_from_files

Domain
detected Domain: cookie.name

XIOC detected Domain: cookie.name

extracted_from_files

Domain
detected Domain: tab.id

XIOC detected Domain: tab.id

extracted_from_files

Domain
detected Domain: data.data

XIOC detected Domain: data.data

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: newcodebutton.id

XIOC detected Domain: newcodebutton.id

extracted_from_files

Domain
detected Domain: syncbutton.id

XIOC detected Domain: syncbutton.id

extracted_from_files

Domain
detected Domain: profileinfo.name

XIOC detected Domain: profileinfo.name

extracted_from_files

Domain
detected Domain: reactin.io

XIOC detected Domain: reactin.io

extracted_from_files

Domain
detected Domain: linkedin.com

XIOC detected Domain: linkedin.com

extracted_from_files

Domain
detected Domain: ß.ac

XIOC detected Domain: ß.ac

extracted_from_files

Domain
detected Domain: www.w3.org

XIOC detected Domain: www.w3.org

extracted_from_files

Domain
detected Domain: toast.show

XIOC detected Domain: toast.show

extracted_from_files

URL
detected URL: https://clients2.google.com/service/update2/crx

XIOC detected URL: https://clients2.google.com/service/update2/crx

extracted_from_files

Domain
detected Domain: www.linkedin.com

XIOC detected Domain: www.linkedin.com

extracted_from_files

IP
detected IP: c4::

XIOC detected IP: c4::

extracted_from_files

IP
detected IP: ::53

XIOC detected IP: ::53

extracted_from_files

IP
detected IP: ::bef

XIOC detected IP: ::bef

extracted_from_files

IP
detected IP: ::af

XIOC detected IP: ::af

extracted_from_files

Domain
detected Domain: clients2.google.com

XIOC detected Domain: clients2.google.com

extracted_from_files

Domain
detected Domain: app.reactin.io

XIOC detected Domain: app.reactin.io

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

Security Analysis Summary

Security Analysis Overview

ReactIn is a Chrome Web Store extension published by [email protected]. Version 1.2.0 has been analyzed by the Risky Plugins security platform, receiving a risk score of 66.72/100 (HIGH risk) based on 49 security findings.

Risk Assessment

This extension presents high security risk. Significant concerns were identified during analysis. It is not recommended for use in sensitive or production environments without thorough review.

Findings Breakdown

  • Medium: 41 finding(s)
  • Low: 8 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

ReactIn is published by [email protected] on the Chrome Web Store marketplace. The extension has approximately 906 users.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions