Is "Samax: FinOps & Cloud Savings" on Chrome Web Store Safe to Install?

[email protected] · chrome · v1.0.4

ACELERE SUA ESTRATÉGIA DE FINOPS E DESCUBRA OPORTUNIDADES DE ECONOMIA ENQUANTO NAVEGA A Samax é a ferramenta definitiva para Engenheiros, DevOps e gestores de FinOps que precisam de agilidade. Transforme a maneira como você interage com a nuvem: em vez de apenas visualizar recursos, veja imediatamente quanto dinheiro você pode economizar e tome ações corretivas em segundos. Integrada diretamente ao seu fluxo de trabalho e à Plataforma Samax, esta extensão elimina o ruído dos consoles de nuvem e destaca o que realmente importa: eficiência e redução de custos. POR QUE INSTALAR A SAMAX? A interface da AWS é vasta, e encontrar dados de custo específicos para um recurso pode levar dezenas de cliques. A Samax atua como uma camada de inteligência sobre o console: INSIGHTS DE ECONOMIA EM TEMPO REAL: Ao navegar, a extensão destaca oportunidades de otimização (ex: recursos ociosos, sugestões de rightsizing) e calcula o valor exato que pode ser poupado. NAVEGAÇÃO DIRETA AO PONTO: Esqueça a busca manual. Vá direto para os detalhes de custo e configuração dos serviços que precisam de atenção. AÇÃO, NÃO APENAS DADOS: Identificou um desperdício? A extensão facilita o fluxo para que você possa aplicar melhorias na infraestrutura ou excluir recursos não utilizados rapidamente. COMO FUNCIONA 1. Instale a extensão. 2. Faça login no seu Console da AWS. 3. A Samax detectará o contexto e solicitará o login seguro na nossa plataforma. 4. Pronto: seus dados de navegação agora são enriquecidos com inteligência financeira. Nesta versão inicial, a extensão oferece suporte total e otimizado para o ambiente Amazon Web Services (AWS).

Risk Assessment

Analyzed
68.04
out of 100
HIGH

306 security findings detected across all analyzers

Chrome extension requesting 11 permissions

Severity Breakdown

0
Critical
0
High
289
Medium
17
Low
0
Info

Finding Categories

2
Network
282
IoC Indicators

YARA Rules Matched

9 rules(17 hits)
postinstall system command postinstall obfuscation postinstall file manipulation postinstall network communication postinstall file download postinstall registry modification NoUseWeakRandom postinstall crypto operations postinstall persistence mechanism

Requested Permissions

11 permissions
cookies

Read and modify cookies on all sites

High
tabs
Medium
activeTab
Medium
storage
Low
sidePanel
Low
https://*.samax.io/*
Low
https://plataforma.samax.io/*
Low
https://api.samax.io/*
Low
https://*.console.aws.amazon.com/*
Low
https://*.aws.amazon.com/*
Low
https://console.aws.amazon.com/*
Low

About This Extension

ACELERE SUA ESTRATÉGIA DE FINOPS E DESCUBRA OPORTUNIDADES DE ECONOMIA ENQUANTO NAVEGA A Samax é a ferramenta definitiva para Engenheiros, DevOps e gestores de FinOps que precisam de agilidade. Transforme a maneira como você interage com a nuvem: em vez de apenas visualizar recursos, veja imediatamente quanto dinheiro você pode economizar e tome ações corretivas em segundos. Integrada diretamente ao seu fluxo de trabalho e à Plataforma Samax, esta extensão elimina o ruído dos consoles de nuvem e destaca o que realmente importa: eficiência e redução de custos. POR QUE INSTALAR A SAMAX? A interface da AWS é vasta, e encontrar dados de custo específicos para um recurso pode levar dezenas de cliques. A Samax atua como uma camada de inteligência sobre o console: INSIGHTS DE ECONOMIA EM TEMPO REAL: Ao navegar, a extensão destaca oportunidades de otimização (ex: recursos ociosos, sugestões de rightsizing) e calcula o valor exato que pode ser poupado. NAVEGAÇÃO DIRETA AO PONTO: Esqueça a busca manual. Vá direto para os detalhes de custo e configuração dos serviços que precisam de atenção. AÇÃO, NÃO APENAS DADOS: Identificou um desperdício? A extensão facilita o fluxo para que você possa aplicar melhorias na infraestrutura ou excluir recursos não utilizados rapidamente. COMO FUNCIONA 1. Instale a extensão. 2. Faça login no seu Console da AWS. 3. A Samax detectará o contexto e solicitará o login seguro na nossa plataforma. 4. Pronto: seus dados de navegação agora são enriquecidos com inteligência financeira. Nesta versão inicial, a extensão oferece suporte total e otimizado para o ambiente Amazon Web Services (AWS).

Detailed Findings

20 total

YARA Rule Matches

9 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
16
IP Addresses
8
Domains
259
Strings
282

All Indicators · 282

IP
detected IP: ::bac

XIOC detected IP: ::bac

extracted_from_files

Domain
detected Domain: e.toasts.map

XIOC detected Domain: e.toasts.map

extracted_from_files

Domain
detected Domain: i.name

XIOC detected Domain: i.name

extracted_from_files

IP
detected IP: d::f

XIOC detected IP: d::f

extracted_from_files

IP
detected IP: ::f

XIOC detected IP: ::f

extracted_from_files

IP
detected IP: 0::f

XIOC detected IP: 0::f

extracted_from_files

IP
detected IP: ea::

XIOC detected IP: ea::

extracted_from_files

Domain
detected Domain: samax.io

XIOC detected Domain: samax.io

extracted_from_files

Domain
detected Domain: n.name

XIOC detected Domain: n.name

extracted_from_files

Domain
detected Domain: n.aws

XIOC detected Domain: n.aws

extracted_from_files

Domain
detected Domain: l.name

XIOC detected Domain: l.name

extracted_from_files

Domain
detected Domain: e.cookie.name

XIOC detected Domain: e.cookie.name

extracted_from_files

Domain
detected Domain: globalthis.chrome

XIOC detected Domain: globalthis.chrome

extracted_from_files

Domain
detected Domain: api.samax.io

XIOC detected Domain: api.samax.io

extracted_from_files

Domain
detected Domain: v.call

XIOC detected Domain: v.call

extracted_from_files

Domain
detected Domain: k.next

XIOC detected Domain: k.next

extracted_from_files

Domain
detected Domain: ee.call

XIOC detected Domain: ee.call

extracted_from_files

Domain
detected Domain: j.call

XIOC detected Domain: j.call

extracted_from_files

Domain
detected Domain: object.prototype.hasownproperty.call

XIOC detected Domain: object.prototype.hasownproperty.call

extracted_from_files

Domain
detected Domain: reactjs.org

XIOC detected Domain: reactjs.org

extracted_from_files

Domain
detected Domain: e.id

XIOC detected Domain: e.id

extracted_from_files

Domain
detected Domain: o.call

XIOC detected Domain: o.call

extracted_from_files

Domain
detected Domain: m.call

XIOC detected Domain: m.call

extracted_from_files

Domain
detected Domain: c.now

XIOC detected Domain: c.now

extracted_from_files

Domain
detected Domain: l.now

XIOC detected Domain: l.now

extracted_from_files

Domain
detected Domain: performance.now

XIOC detected Domain: performance.now

extracted_from_files

Domain
detected Domain: id-a.id

XIOC detected Domain: id-a.id

extracted_from_files

Domain
detected Domain: s.call

XIOC detected Domain: s.call

extracted_from_files

Domain
detected Domain: o.style

XIOC detected Domain: o.style

extracted_from_files

Domain
detected Domain: t.style

XIOC detected Domain: t.style

extracted_from_files

Domain
detected Domain: g.call

XIOC detected Domain: g.call

extracted_from_files

Domain
detected Domain: p.call

XIOC detected Domain: p.call

extracted_from_files

Domain
detected Domain: o.name

XIOC detected Domain: o.name

extracted_from_files

Domain
detected Domain: t.name

XIOC detected Domain: t.name

extracted_from_files

Domain
detected Domain: t.call

XIOC detected Domain: t.call

extracted_from_files

Domain
detected Domain: o.data

XIOC detected Domain: o.data

extracted_from_files

Domain
detected Domain: t.data

XIOC detected Domain: t.data

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: this.target

XIOC detected Domain: this.target

extracted_from_files

Domain
detected Domain: array.prototype.slice.call

XIOC detected Domain: array.prototype.slice.call

extracted_from_files

Domain
detected Domain: t.target

XIOC detected Domain: t.target

extracted_from_files

Domain
detected Domain: o.is

XIOC detected Domain: o.is

extracted_from_files

Domain
detected Domain: ne.data

XIOC detected Domain: ne.data

extracted_from_files

Domain
detected Domain: re.data

XIOC detected Domain: re.data

extracted_from_files

Domain
detected Domain: ve.target

XIOC detected Domain: ve.target

extracted_from_files

Domain
detected Domain: te.target

XIOC detected Domain: te.target

extracted_from_files

Domain
detected Domain: o.target

XIOC detected Domain: o.target

extracted_from_files

Domain
detected Domain: t.top

XIOC detected Domain: t.top

extracted_from_files

Domain
detected Domain: object.is

XIOC detected Domain: object.is

extracted_from_files

Domain
detected Domain: p.next

XIOC detected Domain: p.next

extracted_from_files

Domain
detected Domain: i.next

XIOC detected Domain: i.next

extracted_from_files

Domain
detected Domain: ho.next

XIOC detected Domain: ho.next

extracted_from_files

Domain
detected Domain: b.next

XIOC detected Domain: b.next

extracted_from_files

Domain
detected Domain: xe.call

XIOC detected Domain: xe.call

extracted_from_files

Domain
detected Domain: object.prototype.tostring.call

XIOC detected Domain: object.prototype.tostring.call

extracted_from_files

Domain
detected Domain: p.data

XIOC detected Domain: p.data

extracted_from_files

Domain
detected Domain: te.next

XIOC detected Domain: te.next

extracted_from_files

Domain
detected Domain: ge.call

XIOC detected Domain: ge.call

extracted_from_files

Domain
detected Domain: ne.next

XIOC detected Domain: ne.next

extracted_from_files

Domain
detected Domain: e.next

XIOC detected Domain: e.next

extracted_from_files

Domain
detected Domain: t.next

XIOC detected Domain: t.next

extracted_from_files

Domain
detected Domain: g.next

XIOC detected Domain: g.next

extracted_from_files

Domain
detected Domain: o.next

XIOC detected Domain: o.next

extracted_from_files

Domain
detected Domain: u.is

XIOC detected Domain: u.is

extracted_from_files

Domain
detected Domain: t.id

XIOC detected Domain: t.id

extracted_from_files

Domain
detected Domain: i.compare

XIOC detected Domain: i.compare

extracted_from_files

Domain
detected Domain: h.next

XIOC detected Domain: h.next

extracted_from_files

Domain
detected Domain: lt.next

XIOC detected Domain: lt.next

extracted_from_files

Domain
detected Domain: st.next

XIOC detected Domain: st.next

extracted_from_files

Domain
detected Domain: i.data

XIOC detected Domain: i.data

extracted_from_files

Domain
detected Domain: plataforma.samax.io

XIOC detected Domain: plataforma.samax.io

extracted_from_files

IP
detected IP: 1.5.75.75

XIOC detected IP: 1.5.75.75

extracted_from_files

IP
detected IP: d::

XIOC detected IP: d::

extracted_from_files

Domain
detected Domain: se.memoizedprops.style

XIOC detected Domain: se.memoizedprops.style

extracted_from_files

Domain
detected Domain: p.style

XIOC detected Domain: p.style

extracted_from_files

Domain
detected Domain: g.name

XIOC detected Domain: g.name

extracted_from_files

Domain
detected Domain: u.next

XIOC detected Domain: u.next

extracted_from_files

Domain
detected Domain: e.style

XIOC detected Domain: e.style

extracted_from_files

Domain
detected Domain: l.target

XIOC detected Domain: l.target

extracted_from_files

Domain
detected Domain: d.map

XIOC detected Domain: d.map

extracted_from_files

Domain
detected Domain: r.map

XIOC detected Domain: r.map

extracted_from_files

Domain
detected Domain: e.map

XIOC detected Domain: e.map

extracted_from_files

Domain
detected Domain: s.id

XIOC detected Domain: s.id

extracted_from_files

Domain
detected Domain: n.toast.id

XIOC detected Domain: n.toast.id

extracted_from_files

Domain
detected Domain: k.target

XIOC detected Domain: k.target

extracted_from_files

Domain
detected Domain: pe.li

XIOC detected Domain: pe.li

extracted_from_files

Domain
detected Domain: v.detail.delta

XIOC detected Domain: v.detail.delta

extracted_from_files

Domain
detected Domain: r.target

XIOC detected Domain: r.target

extracted_from_files

Domain
detected Domain: b.target

XIOC detected Domain: b.target

extracted_from_files

Domain
detected Domain: r.originalevent.target

XIOC detected Domain: r.originalevent.target

extracted_from_files

Domain
detected Domain: d.target

XIOC detected Domain: d.target

extracted_from_files

Domain
detected Domain: this.toasts.map

XIOC detected Domain: this.toasts.map

extracted_from_files

Domain
detected Domain: d.id

XIOC detected Domain: d.id

extracted_from_files

Domain
detected Domain: in.map

XIOC detected Domain: in.map

extracted_from_files

Domain
detected Domain: m.media

XIOC detected Domain: m.media

extracted_from_files

Domain
detected Domain: s.map

XIOC detected Domain: s.map

extracted_from_files

Domain
detected Domain: c.map

XIOC detected Domain: c.map

extracted_from_files

Domain
detected Domain: nodefilter.show

XIOC detected Domain: nodefilter.show

extracted_from_files

Domain
detected Domain: b.style

XIOC detected Domain: b.style

extracted_from_files

Domain
detected Domain: le.call

XIOC detected Domain: le.call

extracted_from_files

Domain
detected Domain: st.map

XIOC detected Domain: st.map

extracted_from_files

Domain
detected Domain: b.id

XIOC detected Domain: b.id

extracted_from_files

Domain
detected Domain: ut.info

XIOC detected Domain: ut.info

extracted_from_files

Domain
detected Domain: this.info

XIOC detected Domain: this.info

extracted_from_files

Domain
detected Domain: n.id

XIOC detected Domain: n.id

extracted_from_files

Domain
detected Domain: le.id

XIOC detected Domain: le.id

extracted_from_files

Domain
detected Domain: ae.map

XIOC detected Domain: ae.map

extracted_from_files

Domain
detected Domain: v.id

XIOC detected Domain: v.id

extracted_from_files

Domain
detected Domain: he.id

XIOC detected Domain: he.id

extracted_from_files

Domain
detected Domain: ve.call

XIOC detected Domain: ve.call

extracted_from_files

Domain
detected Domain: e.call

XIOC detected Domain: e.call

extracted_from_files

Domain
detected Domain: st.call

XIOC detected Domain: st.call

extracted_from_files

Domain
detected Domain: e.host

XIOC detected Domain: e.host

extracted_from_files

Domain
detected Domain: y.top

XIOC detected Domain: y.top

extracted_from_files

Domain
detected Domain: n.top-j.top

XIOC detected Domain: n.top-j.top

extracted_from_files

Domain
detected Domain: l.map

XIOC detected Domain: l.map

extracted_from_files

Domain
detected Domain: j.id

XIOC detected Domain: j.id

extracted_from_files

Domain
detected Domain: j.target

XIOC detected Domain: j.target

extracted_from_files

Domain
detected Domain: z.map

XIOC detected Domain: z.map

extracted_from_files

Domain
detected Domain: c.top

XIOC detected Domain: c.top

extracted_from_files

Domain
detected Domain: b.top

XIOC detected Domain: b.top

extracted_from_files

Domain
detected Domain: d.top

XIOC detected Domain: d.top

extracted_from_files

Domain
detected Domain: r.top

XIOC detected Domain: r.top

extracted_from_files

Domain
detected Domain: n.top

XIOC detected Domain: n.top

extracted_from_files

Domain
detected Domain: a.top

XIOC detected Domain: a.top

extracted_from_files

Domain
detected Domain: n.host

XIOC detected Domain: n.host

extracted_from_files

Domain
detected Domain: a.open

XIOC detected Domain: a.open

extracted_from_files

IP
detected Domain: tooltip.open

XIOC detected Domain: tooltip.open

extracted_from_files

Domain
detected Domain: a.style

XIOC detected Domain: a.style

extracted_from_files

Domain
detected Domain: x.style

XIOC detected Domain: x.style

extracted_from_files

Domain
detected Domain: j.floating.style

XIOC detected Domain: j.floating.style

extracted_from_files

Domain
detected Domain: r.name

XIOC detected Domain: r.name

extracted_from_files

Domain
detected Domain: hasownproperty.call

XIOC detected Domain: hasownproperty.call

extracted_from_files

Domain
detected Domain: n.data

XIOC detected Domain: n.data

extracted_from_files

Domain
detected Domain: this.state.data

XIOC detected Domain: this.state.data

extracted_from_files

Domain
detected Domain: yr.call

XIOC detected Domain: yr.call

extracted_from_files

Domain
detected Domain: d.style

XIOC detected Domain: d.style

extracted_from_files

Domain
detected Domain: w.target

XIOC detected Domain: w.target

extracted_from_files

Domain
detected Domain: x.target

XIOC detected Domain: x.target

extracted_from_files

Domain
detected Domain: c.open

XIOC detected Domain: c.open

extracted_from_files

Domain
detected Domain: n.select

XIOC detected Domain: n.select

extracted_from_files

Domain
detected Domain: state.data

XIOC detected Domain: state.data

extracted_from_files

Domain
detected Domain: a.data

XIOC detected Domain: a.data

extracted_from_files

Domain
detected Domain: y.data

XIOC detected Domain: y.data

extracted_from_files

Domain
detected Domain: v.data

XIOC detected Domain: v.data

extracted_from_files

Domain
detected Domain: e.data

XIOC detected Domain: e.data

extracted_from_files

Domain
detected Domain: r.data

XIOC detected Domain: r.data

extracted_from_files

Domain
detected Domain: e.select

XIOC detected Domain: e.select

extracted_from_files

Domain
detected Domain: p.target

XIOC detected Domain: p.target

extracted_from_files

Domain
detected Domain: r.state.data

XIOC detected Domain: r.state.data

extracted_from_files

Domain
detected Domain: e.build

XIOC detected Domain: e.build

extracted_from_files

Domain
detected Domain: n.state.data

XIOC detected Domain: n.state.data

extracted_from_files

Domain
detected Domain: e.state.data

XIOC detected Domain: e.state.data

extracted_from_files

Domain
detected Domain: l.data

XIOC detected Domain: l.data

extracted_from_files

Domain
detected Domain: n.read

XIOC detected Domain: n.read

extracted_from_files

Domain
detected Domain: object.prototype.propertyisenumerable.call

XIOC detected Domain: object.prototype.propertyisenumerable.call

extracted_from_files

Domain
detected Domain: array.prototype.foreach.call

XIOC detected Domain: array.prototype.foreach.call

extracted_from_files

Domain
detected Domain: n.map

XIOC detected Domain: n.map

extracted_from_files

Domain
detected Domain: c.target

XIOC detected Domain: c.target

extracted_from_files

Domain
detected Domain: y.id

XIOC detected Domain: y.id

extracted_from_files

Domain
detected Domain: z.target

XIOC detected Domain: z.target

extracted_from_files

Domain
detected Domain: j.delta

XIOC detected Domain: j.delta

extracted_from_files

Domain
detected Domain: j.name

XIOC detected Domain: j.name

extracted_from_files

Domain
detected Domain: r.host

XIOC detected Domain: r.host

extracted_from_files

Domain
detected Domain: s.host

XIOC detected Domain: s.host

extracted_from_files

Domain
detected Domain: e.gap

XIOC detected Domain: e.gap

extracted_from_files

Domain
detected Domain: e.top

XIOC detected Domain: e.top

extracted_from_files

Domain
detected Domain: e.as

XIOC detected Domain: e.as

extracted_from_files

Domain
detected Domain: y.target

XIOC detected Domain: y.target

extracted_from_files

Domain
detected Domain: w.top

XIOC detected Domain: w.top

extracted_from_files

Domain
detected Domain: s.currenttarget.click

XIOC detected Domain: s.currenttarget.click

extracted_from_files

Domain
detected Domain: a.target

XIOC detected Domain: a.target

extracted_from_files

Domain
detected Domain: k.map

XIOC detected Domain: k.map

extracted_from_files

Domain
detected Domain: r.open

XIOC detected Domain: r.open

extracted_from_files

Domain
detected Domain: l.open

XIOC detected Domain: l.open

extracted_from_files

Domain
detected Domain: a0.call

XIOC detected Domain: a0.call

extracted_from_files

Domain
detected Domain: rj.call

XIOC detected Domain: rj.call

extracted_from_files

Domain
detected Domain: ej.call

XIOC detected Domain: ej.call

extracted_from_files

Domain
detected Domain: jp.call

XIOC detected Domain: jp.call

extracted_from_files

Domain
detected Domain: a.name

XIOC detected Domain: a.name

extracted_from_files

Domain
detected Domain: t.map

XIOC detected Domain: t.map

extracted_from_files

Domain
detected Domain: r.aws

XIOC detected Domain: r.aws

extracted_from_files

Domain
detected Domain: kj.call

XIOC detected Domain: kj.call

extracted_from_files

Domain
detected Domain: bj.call

XIOC detected Domain: bj.call

extracted_from_files

Domain
detected Domain: ij.call

XIOC detected Domain: ij.call

extracted_from_files

Domain
detected Domain: pj.call

XIOC detected Domain: pj.call

extracted_from_files

Domain
detected Domain: fd.keys.ie

XIOC detected Domain: fd.keys.ie

extracted_from_files

Domain
detected Domain: hj.call

XIOC detected Domain: hj.call

extracted_from_files

Domain
detected Domain: cj.call

XIOC detected Domain: cj.call

extracted_from_files

Domain
detected Domain: uo.call

XIOC detected Domain: uo.call

extracted_from_files

Domain
detected Domain: no.call

XIOC detected Domain: no.call

extracted_from_files

Domain
detected Domain: xk.call

XIOC detected Domain: xk.call

extracted_from_files

Domain
detected Domain: gk.call

XIOC detected Domain: gk.call

extracted_from_files

Domain
detected Domain: ck.call

XIOC detected Domain: ck.call

extracted_from_files

Domain
detected Domain: uk.call

XIOC detected Domain: uk.call

extracted_from_files

Domain
detected Domain: ik.call

XIOC detected Domain: ik.call

extracted_from_files

Domain
detected Domain: ce.map

XIOC detected Domain: ce.map

extracted_from_files

Domain
detected Domain: pt.name

XIOC detected Domain: pt.name

extracted_from_files

Domain
detected Domain: ev.call

XIOC detected Domain: ev.call

extracted_from_files

Domain
detected Domain: m.name

XIOC detected Domain: m.name

extracted_from_files

Domain
detected Domain: r.call

XIOC detected Domain: r.call

extracted_from_files

Domain
detected Domain: vv.call

XIOC detected Domain: vv.call

extracted_from_files

Domain
detected Domain: so.call

XIOC detected Domain: so.call

extracted_from_files

Domain
detected Domain: a.next

XIOC detected Domain: a.next

extracted_from_files

Domain
detected Domain: w.as

XIOC detected Domain: w.as

extracted_from_files

Domain
detected Domain: w.name

XIOC detected Domain: w.name

extracted_from_files

Domain
detected Domain: ye.id

XIOC detected Domain: ye.id

extracted_from_files

Domain
detected Domain: ye.name

XIOC detected Domain: ye.name

extracted_from_files

Domain
detected Domain: je.id

XIOC detected Domain: je.id

extracted_from_files

Domain
detected Domain: je.name

XIOC detected Domain: je.name

extracted_from_files

Domain
detected Domain: c.name

XIOC detected Domain: c.name

extracted_from_files

URL
detected URL: https://fonts.googleapis.com

XIOC detected URL: https://fonts.googleapis.com

extracted_from_files

URL
detected URL: https://*.samax.io/*

XIOC detected URL: https://*.samax.io/*

extracted_from_files

URL
detected URL: https://clients2.google.com/service/update2/crx

XIOC detected URL: https://clients2.google.com/service/update2/crx

extracted_from_files

Domain
detected Domain: li.call

XIOC detected Domain: li.call

extracted_from_files

Domain
detected Domain: di.call

XIOC detected Domain: di.call

extracted_from_files

Domain
detected Domain: e.name

XIOC detected Domain: e.name

extracted_from_files

Domain
detected Domain: s.options.name

XIOC detected Domain: s.options.name

extracted_from_files

Domain
detected Domain: c.options.name

XIOC detected Domain: c.options.name

extracted_from_files

Domain
detected Domain: l.call

XIOC detected Domain: l.call

extracted_from_files

Domain
detected Domain: e.errors.map

XIOC detected Domain: e.errors.map

extracted_from_files

Domain
detected Domain: y.call

XIOC detected Domain: y.call

extracted_from_files

Domain
detected Domain: this.map

XIOC detected Domain: this.map

extracted_from_files

Domain
detected Domain: this.refs.map

XIOC detected Domain: this.refs.map

extracted_from_files

Domain
detected Domain: console.aws.amazon.com

XIOC detected Domain: console.aws.amazon.com

extracted_from_files

Domain
detected Domain: e.spec.types.map

XIOC detected Domain: e.spec.types.map

extracted_from_files

Domain
detected Domain: lt.email

XIOC detected Domain: lt.email

extracted_from_files

Domain
detected Domain: c.search

XIOC detected Domain: c.search

extracted_from_files

Domain
detected Domain: r.options.name

XIOC detected Domain: r.options.name

extracted_from_files

Domain
detected Domain: n.day

XIOC detected Domain: n.day

extracted_from_files

Domain
detected Domain: m.options.name

XIOC detected Domain: m.options.name

extracted_from_files

Domain
detected Domain: r.style

XIOC detected Domain: r.style

extracted_from_files

Domain
detected Domain: pe.select

XIOC detected Domain: pe.select

extracted_from_files

Domain
detected Domain: a.id

XIOC detected Domain: a.id

extracted_from_files

Domain
detected Domain: l.style

XIOC detected Domain: l.style

extracted_from_files

Domain
detected Domain: d.style.top

XIOC detected Domain: d.style.top

extracted_from_files

Domain
detected Domain: l.top

XIOC detected Domain: l.top

extracted_from_files

Domain
detected Domain: n.style

XIOC detected Domain: n.style

extracted_from_files

Domain
detected Domain: s.style

XIOC detected Domain: s.style

extracted_from_files

Domain
detected Domain: w.open

XIOC detected Domain: w.open

extracted_from_files

Domain
detected Domain: d.name

XIOC detected Domain: d.name

extracted_from_files

Domain
detected Domain: y.map

XIOC detected Domain: y.map

extracted_from_files

Domain
detected Domain: f.id

XIOC detected Domain: f.id

extracted_from_files

Domain
detected Domain: f.name

XIOC detected Domain: f.name

extracted_from_files

Domain
detected Domain: f.aws

XIOC detected Domain: f.aws

extracted_from_files

Domain
detected Domain: a.map

XIOC detected Domain: a.map

extracted_from_files

Domain
detected Domain: g.resource.id

XIOC detected Domain: g.resource.id

extracted_from_files

Domain
detected Domain: window.open

XIOC detected Domain: window.open

extracted_from_files

Domain
detected Domain: x.name

XIOC detected Domain: x.name

extracted_from_files

Domain
detected Domain: b.map

XIOC detected Domain: b.map

extracted_from_files

Domain
detected Domain: x.id

XIOC detected Domain: x.id

extracted_from_files

Domain
detected Domain: c.id

XIOC detected Domain: c.id

extracted_from_files

Domain
detected Domain: y.aws

XIOC detected Domain: y.aws

extracted_from_files

Domain
detected Domain: k.name

XIOC detected Domain: k.name

extracted_from_files

Domain
detected Domain: k.id

XIOC detected Domain: k.id

extracted_from_files

Domain
detected Domain: y.recommendation.id

XIOC detected Domain: y.recommendation.id

extracted_from_files

Domain
detected Domain: q.id

XIOC detected Domain: q.id

extracted_from_files

Domain
detected Domain: re.id

XIOC detected Domain: re.id

extracted_from_files

Domain
detected Domain: z.id

XIOC detected Domain: z.id

extracted_from_files

URL
detected URL: https://plataforma.samax.io/

XIOC detected URL: https://plataforma.samax.io/

extracted_from_files

Domain
detected Domain: aws.amazon.com

XIOC detected Domain: aws.amazon.com

extracted_from_files

Domain
detected Domain: ne.id

XIOC detected Domain: ne.id

extracted_from_files

Domain
detected Domain: me.id

XIOC detected Domain: me.id

extracted_from_files

Domain
detected Domain: me.name

XIOC detected Domain: me.name

extracted_from_files

Domain
detected Domain: j.aws

XIOC detected Domain: j.aws

extracted_from_files

Domain
detected Domain: y.name

XIOC detected Domain: y.name

extracted_from_files

URL
detected URL: https://console.aws.amazon.com

XIOC detected URL: https://console.aws.amazon.com

extracted_from_files

URL
detected URL: https://plataforma.samax.io/settings

XIOC detected URL: https://plataforma.samax.io/settings

extracted_from_files

URL
detected URL: https://$

XIOC detected URL: https://$

extracted_from_files

URL
detected URL: https://reactjs.org/docs/error-decoder.html?invariant=

XIOC detected URL: https://reactjs.org/docs/error-decoder.html?invariant=

extracted_from_files

URL
detected URL: https://api.samax.io/api/data-ingestion/sources/

XIOC detected URL: https://api.samax.io/api/data-ingestion/sources/

extracted_from_files

URL
detected URL: https://plataforma.samax.io/api/auth/session

XIOC detected URL: https://plataforma.samax.io/api/auth/session

extracted_from_files

URL
detected URL: https://api.samax.io/api/recommendation/?resource_id=$

XIOC detected URL: https://api.samax.io/api/recommendation/?resource_id=$

extracted_from_files

URL
detected URL: https://api.samax.io/api/recommendation/$

XIOC detected URL: https://api.samax.io/api/recommendation/$

extracted_from_files

URL
detected URL: https://api.samax.io/api/recommendation/

XIOC detected URL: https://api.samax.io/api/recommendation/

extracted_from_files

URL
detected URL: https://api.samax.io/api/resources/

XIOC detected URL: https://api.samax.io/api/resources/

extracted_from_files

URL
detected URL: https://fonts.googleapis.com/css2?family=Inter:wght@400;500;600;700&display=swap

XIOC detected URL: https://fonts.googleapis.com/css2?family=Inter:wght@400;500;600;700&display=swap

extracted_from_files

URL
detected URL: https://fonts.gstatic.com

XIOC detected URL: https://fonts.gstatic.com

extracted_from_files

Domain
detected Domain: this.name

XIOC detected Domain: this.name

extracted_from_files

Domain
detected Domain: ci.call

XIOC detected Domain: ci.call

extracted_from_files

Domain
detected Domain: r.id

XIOC detected Domain: r.id

extracted_from_files

Domain
detected Domain: ui.call

XIOC detected Domain: ui.call

extracted_from_files

Security Analysis Summary

Security Analysis Overview

Samax: FinOps & Cloud Savings is a Chrome Web Store extension published by [email protected]. Version 1.0.4 has been analyzed by the Risky Plugins security platform, receiving a risk score of 68.04/100 (HIGH risk) based on 306 security findings.

Risk Assessment

This extension presents high security risk. Significant concerns were identified during analysis. It is not recommended for use in sensitive or production environments without thorough review.

Findings Breakdown

  • Medium: 289 finding(s)
  • Low: 17 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

Samax: FinOps & Cloud Savings is published by [email protected] on the Chrome Web Store marketplace. The extension has approximately 3 users.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions