Is "shakelform" on Chrome Web Store Safe to Install?
ShakelForm is a powerful Chrome extension that simplifies form creation and data management by seamlessly integrating with Google Sheets. With ShakelForm, you can quickly create customizable forms on web pages and effortlessly collect data that gets automatically sent to your Google Sheets, streamlining your data collection process. Features: Easy Form Creation: Embed forms into web pages with just a few clicks, allowing users to input and submit data effortlessly. Seamless Google Sheets Integration: Automatically send form data to your designated Google Sheet, ensuring accurate and organized data collection. Customization Options: Customize form elements, layouts, and styles to match your branding or specific needs. Efficient Data Management: Centralize and manage collected data directly in your Google Sheet, eliminating the need for manual data entry. User-Friendly Interface: Intuitive user interface makes it simple for users of all skill levels to create and manage forms. How to Use: Install the ShakelForm extension from the Chrome Web Store. Browse to a webpage where you want to embed a form. Click the ShakelForm icon in your Chrome toolbar. Customize the form elements and layout according to your preferences. Publish the form, and users can start submitting data right away. Collected data is seamlessly transferred to your designated Google Sheet for easy access and analysis. Privacy and Security: ShakelForm respects your privacy and security. We do not collect any of your personal data. The extension securely interacts with Google Sheets API for data transmission. Start streamlining your data collection process with ShakelForm today!
Risk Assessment
Analyzed141 security findings detected across all analyzers
Chrome extension requesting 3 permissions
Severity Breakdown
Finding Categories
YARA Rules Matched
7 rules(15 hits)Requested Permissions
3 permissionsAccess your identity and sign-in tokens
About This Extension
Detailed Findings
15 totalYARA Rule Matches
7 rulesIndicators of Compromise
Network indicators, suspicious strings, and potential IoCs extracted during analysis
All Indicators · 116
detected IP: :: XIOC detected IP: ::
extracted_from_files
detected Domain: www.googleapis.com XIOC detected Domain: www.googleapis.com
extracted_from_files
detected URL: http://www.w3.org/1999/xlink XIOC detected URL: http://www.w3.org/1999/xlink
extracted_from_files
detected URL: https://dummyimage.com/90x90 XIOC detected URL: https://dummyimage.com/90x90
extracted_from_files
detected URL: http://www.w3.org/2000/svg XIOC detected URL: http://www.w3.org/2000/svg
extracted_from_files
detected URL: https://dummyimage.com/400x400 XIOC detected URL: https://dummyimage.com/400x400
extracted_from_files
detected URL: https://github.com/zloirock/core-js/blob/v3.29.1/LICENSE XIOC detected URL: https://github.com/zloirock/core-js/blob/v3.29.1/LICENSE
extracted_from_files
detected URL: https://clients2.google.com/service/update2/crx XIOC detected URL: https://clients2.google.com/service/update2/crx
extracted_from_files
detected URL: https://www.googleapis.com/auth/blogger XIOC detected URL: https://www.googleapis.com/auth/blogger
extracted_from_files
detected URL: https://ipinfo.io/json XIOC detected URL: https://ipinfo.io/json
extracted_from_files
detected URL: https://blogger.googleapis.com/v3/blogs/$ XIOC detected URL: https://blogger.googleapis.com/v3/blogs/$
extracted_from_files
detected URL: https://cdn.jsdelivr.net/npm/tailwindcss/dist/tailwind.min.css XIOC detected URL: https://cdn.jsdelivr.net/npm/tailwindcss/dist/tailwind.min.css
extracted_from_files
detected URL: https://shakeltools.net/shakeltablescript XIOC detected URL: https://shakeltools.net/shakeltablescript
extracted_from_files
detected Domain: d.call XIOC detected Domain: d.call
extracted_from_files
detected Domain: jn.scope.off XIOC detected Domain: jn.scope.off
extracted_from_files
detected Domain: v.data XIOC detected Domain: v.data
extracted_from_files
detected Domain: company.com XIOC detected Domain: company.com
extracted_from_files
detected URL: https://www.googleapis.com/blogger/v3/blogs/byurl?url=$ XIOC detected URL: https://www.googleapis.com/blogger/v3/blogs/byurl?url=$
extracted_from_files
detected Domain: x.md XIOC detected Domain: x.md
extracted_from_files
detected Domain: 3.kz XIOC detected Domain: 3.kz
extracted_from_files
detected Domain: т.hk XIOC detected Domain: т.hk
extracted_from_files
detected Domain: m.kp XIOC detected Domain: m.kp
extracted_from_files
detected Domain: v.id XIOC detected Domain: v.id
extracted_from_files
detected Domain: 606277551605-cpuataauftrk5a7rjei6qeavfg75djbr.apps.googleusercontent.com XIOC detected Domain: 606277551605-cpuataauftrk5a7rjei6qeavfg75djbr.apps.googleusercontent.com
extracted_from_files
detected Domain: dummyimage.com XIOC detected Domain: dummyimage.com
extracted_from_files
detected Domain: t.target XIOC detected Domain: t.target
extracted_from_files
detected Domain: t.global XIOC detected Domain: t.global
extracted_from_files
detected Domain: o.call XIOC detected Domain: o.call
extracted_from_files
detected Domain: e.is XIOC detected Domain: e.is
extracted_from_files
detected Domain: u.data XIOC detected Domain: u.data
extracted_from_files
detected Domain: o.is XIOC detected Domain: o.is
extracted_from_files
detected Domain: t.name XIOC detected Domain: t.name
extracted_from_files
detected Domain: v.style XIOC detected Domain: v.style
extracted_from_files
detected Domain: h.top-v.top XIOC detected Domain: h.top-v.top
extracted_from_files
detected Domain: c.el.style XIOC detected Domain: c.el.style
extracted_from_files
detected Domain: array.prototype.filter.call XIOC detected Domain: array.prototype.filter.call
extracted_from_files
detected Domain: h.value.link XIOC detected Domain: h.value.link
extracted_from_files
detected Domain: c.link XIOC detected Domain: c.link
extracted_from_files
detected Domain: h.name XIOC detected Domain: h.name
extracted_from_files
detected Domain: h.style XIOC detected Domain: h.style
extracted_from_files
detected Domain: n.style XIOC detected Domain: n.style
extracted_from_files
detected Domain: kn.scope.off XIOC detected Domain: kn.scope.off
extracted_from_files
detected Domain: array.prototype.slice.call XIOC detected Domain: array.prototype.slice.call
extracted_from_files
detected Domain: date.now XIOC detected Domain: date.now
extracted_from_files
detected Domain: h.map XIOC detected Domain: h.map
extracted_from_files
detected Domain: h.target XIOC detected Domain: h.target
extracted_from_files
detected Domain: c.style XIOC detected Domain: c.style
extracted_from_files
detected Domain: d.style XIOC detected Domain: d.style
extracted_from_files
detected Domain: l.next XIOC detected Domain: l.next
extracted_from_files
detected Domain: r.run XIOC detected Domain: r.run
extracted_from_files
detected Domain: e.id XIOC detected Domain: e.id
extracted_from_files
detected Domain: c.next XIOC detected Domain: c.next
extracted_from_files
detected Domain: c.suspense.next XIOC detected Domain: c.suspense.next
extracted_from_files
detected Domain: f.id XIOC detected Domain: f.id
extracted_from_files
detected Domain: c.data XIOC detected Domain: c.data
extracted_from_files
detected Domain: r.call XIOC detected Domain: r.call
extracted_from_files
detected Domain: c.exposed XIOC detected Domain: c.exposed
extracted_from_files
detected Domain: c.call XIOC detected Domain: c.call
extracted_from_files
detected Domain: n.app XIOC detected Domain: n.app
extracted_from_files
detected Domain: f.is XIOC detected Domain: f.is
extracted_from_files
detected Domain: jc.call XIOC detected Domain: jc.call
extracted_from_files
detected Domain: c.effect.run XIOC detected Domain: c.effect.run
extracted_from_files
detected Domain: l.ec XIOC detected Domain: l.ec
extracted_from_files
detected Domain: v.map XIOC detected Domain: v.map
extracted_from_files
detected Domain: u.call XIOC detected Domain: u.call
extracted_from_files
detected Domain: h.call XIOC detected Domain: h.call
extracted_from_files
detected Domain: a.run XIOC detected Domain: a.run
extracted_from_files
detected Domain: object.is XIOC detected Domain: object.is
extracted_from_files
detected Domain: c.run XIOC detected Domain: c.run
extracted_from_files
detected Domain: c.map XIOC detected Domain: c.map
extracted_from_files
detected Domain: t.call XIOC detected Domain: t.call
extracted_from_files
detected Domain: v.has.call XIOC detected Domain: v.has.call
extracted_from_files
detected Domain: l.call XIOC detected Domain: l.call
extracted_from_files
detected Domain: e.next XIOC detected Domain: e.next
extracted_from_files
detected Domain: l.media XIOC detected Domain: l.media
extracted_from_files
detected Domain: c.media XIOC detected Domain: c.media
extracted_from_files
detected Domain: h.media XIOC detected Domain: h.media
extracted_from_files
detected Domain: h.id XIOC detected Domain: h.id
extracted_from_files
detected Domain: object.prototype.hasownproperty.call XIOC detected Domain: object.prototype.hasownproperty.call
extracted_from_files
detected Domain: k.call XIOC detected Domain: k.call
extracted_from_files
detected Domain: e.call XIOC detected Domain: e.call
extracted_from_files
detected Domain: ipdata.country XIOC detected Domain: ipdata.country
extracted_from_files
detected Domain: turl.search XIOC detected Domain: turl.search
extracted_from_files
detected Domain: i.id XIOC detected Domain: i.id
extracted_from_files
detected Domain: r.parts XIOC detected Domain: r.parts
extracted_from_files
detected Domain: clients2.google.com XIOC detected Domain: clients2.google.com
extracted_from_files
detected Domain: l.parts XIOC detected Domain: l.parts
extracted_from_files
detected Domain: v.parts XIOC detected Domain: v.parts
extracted_from_files
detected Domain: v.call XIOC detected Domain: v.call
extracted_from_files
detected Domain: zloirock.ru XIOC detected Domain: zloirock.ru
extracted_from_files
detected Domain: push.call XIOC detected Domain: push.call
extracted_from_files
detected Domain: c.id XIOC detected Domain: c.id
extracted_from_files
detected Domain: this.map XIOC detected Domain: this.map
extracted_from_files
detected Domain: r.id XIOC detected Domain: r.id
extracted_from_files
detected Domain: n.map XIOC detected Domain: n.map
extracted_from_files
detected Domain: c.global XIOC detected Domain: c.global
extracted_from_files
detected Domain: function.prototype.call XIOC detected Domain: function.prototype.call
extracted_from_files
detected Domain: n.call XIOC detected Domain: n.call
extracted_from_files
detected Domain: l.is XIOC detected Domain: l.is
extracted_from_files
detected Domain: t.data XIOC detected Domain: t.data
extracted_from_files
detected Domain: n.is XIOC detected Domain: n.is
extracted_from_files
detected Domain: c.name XIOC detected Domain: c.name
extracted_from_files
detected Domain: blogger.googleapis.com XIOC detected Domain: blogger.googleapis.com
extracted_from_files
detected Domain: ipinfo.io XIOC detected Domain: ipinfo.io
extracted_from_files
detected Domain: www.w3.org XIOC detected Domain: www.w3.org
extracted_from_files
detected Domain: shakeltools.net XIOC detected Domain: shakeltools.net
extracted_from_files
detected Domain: i.name XIOC detected Domain: i.name
extracted_from_files
detected Domain: i.global XIOC detected Domain: i.global
extracted_from_files
detected Domain: c.target XIOC detected Domain: c.target
extracted_from_files
detected IP: 4:: XIOC detected IP: 4::
extracted_from_files
detected IP: 8::b XIOC detected IP: 8::b
extracted_from_files
detected IP: 9:: XIOC detected IP: 9::
extracted_from_files
detected IP: 8:: XIOC detected IP: 8::
extracted_from_files
detected Domain: cdn.jsdelivr.net XIOC detected Domain: cdn.jsdelivr.net
extracted_from_files
detected Domain: github.com XIOC detected Domain: github.com
extracted_from_files
detected URL: https://dummyimage.com/1200x500 XIOC detected URL: https://dummyimage.com/1200x500
extracted_from_files
Security Analysis Summary
Security Analysis Overview
shakelform is a Chrome Web Store extension published by [email protected]. Version 2.0.1 has been analyzed by the Risky Plugins security platform, receiving a risk score of 41.27/100 (MEDIUM risk) based on 141 security findings.
Risk Assessment
This extension presents moderate security risk. Several findings were detected that may warrant attention. Users should carefully review the permissions and findings before installation.
Findings Breakdown
- High: 15 finding(s)
- Medium: 126 finding(s)
What Was Analyzed
The security assessment covers multiple analysis categories:
- Malware Detection: YARA rule matching against 2,400+ malware signatures
- Secret Detection: Scanning for exposed API keys, tokens, and credentials
- Static Analysis: Code-level security analysis for common vulnerability patterns
- Network Analysis: Detection of suspicious network communications and endpoints
- Obfuscation Detection: Identification of code obfuscation techniques
Developer Information
shakelform is published by [email protected] on the Chrome Web Store marketplace. The extension has approximately 6 users.
Recommendation
Exercise caution with this extension. Review the detailed findings and ensure the requested permissions align with the extension's stated functionality before installation.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace
Shakel-Table
[email protected]
Send to NotebookLM
[email protected]
Chat AI - Chat GPT 5 on all sites
[email protected]
SensePage
[email protected]
Auto Gmail - ChatGPT AI for email inbox
[email protected]
Page Locker
[email protected]