Is "Trump Eraser" on Firefox Add-ons Safe to Install?
🪄 Trump Eraser – The Vanishing Act Your Browser Deserves. Worn down by the trump, Trump, TRUMP of it all? 🤯 Yeah. Same. Trump Eraser is a lightweight, privacy-first browser extension that replaces Donald Trump’s name (in all its ugly permutations) wherever it appears online. 🔭 What to expect after install • The Options page opens on install with a quick Welcome message— please read . • Add or paste your nicknames (up to 12). • Optional: try a Nickname Pack from the dropdown above the editor — curated lists you can enable instantly. (Your personal list is always preserved.) • Optional: add sites/pages you want us to leave unchanged. By default, you get a satisfying [REDACTED] but you can also load up to 12 custom nicknames, randomly swapped in whenever that name shows up. And when we say wherever, when mean wherever : • News articles? Check. • Social media scrolls? Give THAT a like! • Tooltips ? Yep. • Generated closed captions on YouTube? We were surprised too, but yeah! • Pop-ups, comments, headlines — even the White House website? You bet. ESPECIALLY the White House website. 😆 From relentless newsfeeds to doomscrolling comment sections, Trump Eraser is your personal, satirical pressure-release valve for a noisy internet. Take back your feed. Take back your sanity. Take back the internet. 🔥 Why You’ll Love Trump Eraser ✅ Instant Trump Removal - His name disappears the moment a page loads. Even works on YouTube captions, pop-ups, and tooltips. ✅ Your Own Nickname Arsenal - Load up to 12 of your favorite “terms of endearment.” The extension picks one at random each time it sees that name. ✅ Nickname Packs, Always Free - One-click, curated sets from us and partners. Keep any you like, or copy/paste favorites into your own list. ✅ Works Nearly Everywhere - News, social media, comment threads, tooltips - if it’s text, we’ve got it covered. ✅ Total Control - Want to leave some sites untouched? Add them to your built-in Exclude List. ✅ Privacy-First, Always - No tracking. No ads. No server calls. No data collection. ✅ Built-In Help - Full FAQ and support, right inside the extension. ✅ Community Flavor - See what others are using in the Trump Nickname Hall of 🔥Flame🔥 at www.TrumpEraser.com . 🛠️ Smarter Than the Average Filter Other tools just block articles or miss buried mentions. Honestly, if you don’t want to read the news, there’s a whole internet of cat videos out there. Trump Eraser dives deep into each page, even inside dynamic content and real-time feeds, so you stay informed without being constantly bombarded by that name. 🔧 How It Works 1️⃣ Install in seconds. 2️⃣ Watch his name vanish, replaced with [REDACTED]. 3️⃣ Add your favorite nicknames or pick one of our curated Nickname Packs and laugh at what shows up next. 4️⃣ That’s it. Same old circus but a MUCH funnier clown. 👀 See Trump Eraser in Action Visit TrumpEraser.com for demos, FAQs, and more about how it works. Got questions? Comments? Drop us a line - it gets lonely here in space! 🪄 Try Trump Eraser Today. Watch Him Vanish Before Your Eyes! Now you see him, now you don’t!!
Risk Assessment
Analyzed109 security findings detected across all analyzers
Firefox extension requesting 4 permissions
Severity Breakdown
Finding Categories
YARA Rules Matched
8 rules(23 hits)Requested Permissions
4 permissionsAccess and modify data on every website you visit
About This Extension
Detailed Findings
23 totalYARA Rule Matches
8 rulesIndicators of Compromise
Network indicators, suspicious strings, and potential IoCs extracted during analysis
All Indicators · 83
detected Domain: trumperaser.com XIOC detected Domain: trumperaser.com
extracted_from_files
detected IP: ::bef XIOC detected IP: ::bef
extracted_from_files
detected URL: https://chromewebstore.google.com/detail/hnjiblolaoioakkhogfhdmemlgcihmjg', XIOC detected URL: https://chromewebstore.google.com/detail/hnjiblolaoioakkhogfhdmemlgcihmjg',
extracted_from_files
detected URL: https://microsoftedge.microsoft.com/addons/detail/trump-eraser/ccbhldlkgchdlhcgafhccbnheebgdmgj', XIOC detected URL: https://microsoftedge.microsoft.com/addons/detail/trump-eraser/ccbhldlkgchdlhcgafhccbnheebgdmgj',
extracted_from_files
detected URL: https://addons.mozilla.org/en-US/firefox/addon/trump-eraser/' XIOC detected URL: https://addons.mozilla.org/en-US/firefox/addon/trump-eraser/'
extracted_from_files
detected URL: https://www.trumperaser.com/trump-nickname-hall-of-flame/ XIOC detected URL: https://www.trumperaser.com/trump-nickname-hall-of-flame/
extracted_from_files
detected URL: https://partner.microsoft.com/* XIOC detected URL: https://partner.microsoft.com/*
extracted_from_files
detected URL: https://addons.mozilla.org/* XIOC detected URL: https://addons.mozilla.org/*
extracted_from_files
detected URL: https://www.TrumpEraser.com/status XIOC detected URL: https://www.TrumpEraser.com/status
extracted_from_files
detected URL: https://www.TrumpEraser.com XIOC detected URL: https://www.TrumpEraser.com
extracted_from_files
detected URL: https://buymeacoffee.com/trumperaser?utm_source=options&utm_medium=faq&utm_campaign=coffee XIOC detected URL: https://buymeacoffee.com/trumperaser?utm_source=options&utm_medium=faq&utm_campaign=coffee
extracted_from_files
detected URL: https://www.trumperaser.com/contact/ XIOC detected URL: https://www.trumperaser.com/contact/
extracted_from_files
detected URL: http://www.w3.org/1999/02/22-rdf-syntax-ns# XIOC detected URL: http://www.w3.org/1999/02/22-rdf-syntax-ns#
extracted_from_files
detected URL: http://purl.org/dc/elements/1.1/ XIOC detected URL: http://purl.org/dc/elements/1.1/
extracted_from_files
detected URL: https://chatgpt.com/* XIOC detected URL: https://chatgpt.com/*
extracted_from_files
detected URL: https://www.buymeacoffee.com/* XIOC detected URL: https://www.buymeacoffee.com/*
extracted_from_files
detected URL: https://studio.buymeacoffee.com/* XIOC detected URL: https://studio.buymeacoffee.com/*
extracted_from_files
detected URL: https://buymeacoffee.com/* XIOC detected URL: https://buymeacoffee.com/*
extracted_from_files
detected Domain: tabbutton.click XIOC detected Domain: tabbutton.click
extracted_from_files
detected Domain: ev.target XIOC detected Domain: ev.target
extracted_from_files
detected URL: http://addons.mozilla.org/ca/crl.pem0N XIOC detected URL: http://addons.mozilla.org/ca/crl.pem0N
extracted_from_files
detected URL: http://ns.adobe.com/photoshop/1.0/ XIOC detected URL: http://ns.adobe.com/photoshop/1.0/
extracted_from_files
detected URL: http://ns.adobe.com/tiff/1.0/ XIOC detected URL: http://ns.adobe.com/tiff/1.0/
extracted_from_files
detected Domain: nick.save XIOC detected Domain: nick.save
extracted_from_files
detected Domain: nf.save XIOC detected Domain: nf.save
extracted_from_files
detected Domain: p.id XIOC detected Domain: p.id
extracted_from_files
detected Domain: p.name XIOC detected Domain: p.name
extracted_from_files
detected Domain: pack.name XIOC detected Domain: pack.name
extracted_from_files
detected Domain: pack.id XIOC detected Domain: pack.id
extracted_from_files
detected Domain: helptabbutton.click XIOC detected Domain: helptabbutton.click
extracted_from_files
detected Domain: location.search XIOC detected Domain: location.search
extracted_from_files
detected Domain: hidden.click XIOC detected Domain: hidden.click
extracted_from_files
detected Domain: helpbtn.click XIOC detected Domain: helpbtn.click
extracted_from_files
detected Domain: attr.name XIOC detected Domain: attr.name
extracted_from_files
detected Domain: raw.map XIOC detected Domain: raw.map
extracted_from_files
detected Domain: a.target XIOC detected Domain: a.target
extracted_from_files
detected Domain: hiddenlink.click XIOC detected Domain: hiddenlink.click
extracted_from_files
detected URL: https://microsoftedge.microsoft.com/addons/detail/$ XIOC detected URL: https://microsoftedge.microsoft.com/addons/detail/$
extracted_from_files
detected Domain: www.facebook.com XIOC detected Domain: www.facebook.com
extracted_from_files
detected Domain: example.com XIOC detected Domain: example.com
extracted_from_files
detected Domain: www.example.com XIOC detected Domain: www.example.com
extracted_from_files
detected Domain: chromewebstore.google.com XIOC detected Domain: chromewebstore.google.com
extracted_from_files
detected Domain: microsoftedge.microsoft.com XIOC detected Domain: microsoftedge.microsoft.com
extracted_from_files
detected Domain: config.id XIOC detected Domain: config.id
extracted_from_files
detected Domain: purl.org XIOC detected Domain: purl.org
extracted_from_files
detected Domain: chatgpt.com XIOC detected Domain: chatgpt.com
extracted_from_files
detected Domain: www.buymeacoffee.com XIOC detected Domain: www.buymeacoffee.com
extracted_from_files
detected Domain: studio.buymeacoffee.com XIOC detected Domain: studio.buymeacoffee.com
extracted_from_files
detected Domain: buymeacoffee.com XIOC detected Domain: buymeacoffee.com
extracted_from_files
detected Domain: partner.microsoft.com XIOC detected Domain: partner.microsoft.com
extracted_from_files
detected Domain: www.trumperaser.com XIOC detected Domain: www.trumperaser.com
extracted_from_files
detected Domain: e.target XIOC detected Domain: e.target
extracted_from_files
detected Domain: n.data XIOC detected Domain: n.data
extracted_from_files
detected Domain: nodefilter.show XIOC detected Domain: nodefilter.show
extracted_from_files
detected Domain: m.target XIOC detected Domain: m.target
extracted_from_files
detected Domain: mutation.target XIOC detected Domain: mutation.target
extracted_from_files
detected Domain: orig.call XIOC detected Domain: orig.call
extracted_from_files
detected Domain: changelog.md XIOC detected Domain: changelog.md
extracted_from_files
detected Domain: window.top XIOC detected Domain: window.top
extracted_from_files
detected Domain: origattach.call XIOC detected Domain: origattach.call
extracted_from_files
detected Domain: reddit.com XIOC detected Domain: reddit.com
extracted_from_files
detected Domain: performance.now XIOC detected Domain: performance.now
extracted_from_files
detected Domain: object.prototype.hasownproperty.call XIOC detected Domain: object.prototype.hasownproperty.call
extracted_from_files
detected Domain: r.top XIOC detected Domain: r.top
extracted_from_files
detected Domain: www.w3.org XIOC detected Domain: www.w3.org
extracted_from_files
detected Domain: ns.adobe.com XIOC detected Domain: ns.adobe.com
extracted_from_files
detected Domain: app.constants.justify.center XIOC detected Domain: app.constants.justify.center
extracted_from_files
detected Domain: app.constants.objectselection.select XIOC detected Domain: app.constants.objectselection.select
extracted_from_files
detected Domain: app.constants.showcommands.show XIOC detected Domain: app.constants.showcommands.show
extracted_from_files
detected Domain: app.constants.verticaltype.center XIOC detected Domain: app.constants.verticaltype.center
extracted_from_files
detected Domain: date.now XIOC detected Domain: date.now
extracted_from_files
detected IP: :: XIOC detected IP: ::
extracted_from_files
detected Domain: signingca1.addons.mozilla.org XIOC detected Domain: signingca1.addons.mozilla.org
extracted_from_files
detected Domain: mozilla.com XIOC detected Domain: mozilla.com
extracted_from_files
detected Domain: addons.mozilla.org XIOC detected Domain: addons.mozilla.org
extracted_from_files
detected Domain: content-signature.mozilla.org XIOC detected Domain: content-signature.mozilla.org
extracted_from_files
detected Domain: manvsmachinemedia.com XIOC detected Domain: manvsmachinemedia.com
extracted_from_files
detected Domain: t3537260a7c3ad46c070c23c57cde630f.99c51bcc4116f8b8b776699243ee2e4b.addons.mozilla.org XIOC detected Domain: t3537260a7c3ad46c070c23c57cde630f.99c51bcc4116f8b8b776699243ee2e4b.addons.mozilla.org
extracted_from_files
detected URL: https://chromewebstore.google.com/detail/$ XIOC detected URL: https://chromewebstore.google.com/detail/$
extracted_from_files
detected MD5 Hash: 99c51bcc4116f8b8b776699243ee2e4b XIOC detected MD5 Hash: 99c51bcc4116f8b8b776699243ee2e4b
extracted_from_files
detected URL: https://addons.mozilla.org/en-US/firefox/addon/$ XIOC detected URL: https://addons.mozilla.org/en-US/firefox/addon/$
extracted_from_files
Security Analysis Summary
Security Analysis Overview
Trump Eraser is a Firefox Add-ons extension published by Man vs. Machine Media. Version 2.5.2 has been analyzed by the Risky Plugins security platform, receiving a risk score of 40.46/100 (MEDIUM risk) based on 109 security findings.
Risk Assessment
This extension presents moderate security risk. Several findings were detected that may warrant attention. Users should carefully review the permissions and findings before installation.
Findings Breakdown
- High: 23 finding(s)
- Medium: 86 finding(s)
What Was Analyzed
The security assessment covers multiple analysis categories:
- Malware Detection: YARA rule matching against 2,400+ malware signatures
- Secret Detection: Scanning for exposed API keys, tokens, and credentials
- Static Analysis: Code-level security analysis for common vulnerability patterns
- Network Analysis: Detection of suspicious network communications and endpoints
- Obfuscation Detection: Identification of code obfuscation techniques
Developer Information
Trump Eraser is published by Man vs. Machine Media on the Firefox Add-ons marketplace. The extension has approximately 46 users.
Recommendation
Exercise caution with this extension. Review the detailed findings and ensure the requested permissions align with the extension's stated functionality before installation.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace