Is "PotatoPlus" on Microsoft Edge Add-ons Safe to Install?

Limos · edge · v0.3.10

为教务网化上妆容,面貌焕然一新! 精心设计的课程列表让重要信息一览无余,并提供了丰富的搜索与过滤功能;更有自动刷新等多个增强模块,它们融合交织,将体验提升到前所未有的高度。 差点忘了,它还只是一个插件。

Risk Assessment

Analyzed
100
out of 100
CRITICAL

419 security findings detected across all analyzers

Severity Breakdown

0
Critical
38
High
364
Medium
0
Low
0
Info

Finding Categories

38
Malware Signatures
31
Network
333
IoC Indicators

YARA Rules Matched

12 rules(38 hits)
postinstall file manipulation postinstall obfuscation SQLInjection postinstall network communication postinstall system command NoUseWeakRandom postinstall crypto operations UntrustedContentShouldNotBeIncluded postinstall registry modification postinstall file download postinstall environment access LocalStorageShouldNotBeUsed

Detailed Findings

86 total

YARA Rule Matches

12 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
24
IP Addresses
22
Domains
285
Strings
333

All Indicators · 333

Domain
detected Domain: qt.tab

XIOC detected Domain: qt.tab

extracted_from_files

Domain
detected Domain: q.call

XIOC detected Domain: q.call

extracted_from_files

Domain
detected Domain: v.call

XIOC detected Domain: v.call

extracted_from_files

Domain
detected Domain: t.call

XIOC detected Domain: t.call

extracted_from_files

Hash
detected MD5 Hash: 53662BB0587D261885E230612A77E19F

XIOC detected MD5 Hash: 53662BB0587D261885E230612A77E19F

extracted_from_files

URL
detected URL: https://cubiccm.ddns.net/about

XIOC detected URL: https://cubiccm.ddns.net/about

extracted_from_files

URL
detected URL: https://jw.nju.edu.cn/qxnjxxl/list.htm

XIOC detected URL: https://jw.nju.edu.cn/qxnjxxl/list.htm

extracted_from_files

URL
detected URL: https://example.com/captcha-solver/?data=

XIOC detected URL: https://example.com/captcha-solver/?data=

extracted_from_files

URL
detected URL: https://cubiccm.ddns.net/captcha-solver/?mode=xk&data=

XIOC detected URL: https://cubiccm.ddns.net/captcha-solver/?mode=xk&data=

extracted_from_files

URL
detected URL: https://stackoverflow.com/questions/55699861/implementing-reduce-from-scratch-not-sure-how-js-knows-what-array-is

XIOC detected URL: https://stackoverflow.com/questions/55699861/implementing-reduce-from-scratch-not-sure-how-js-knows-what-array-is

extracted_from_files

URL
detected URL: https://github.com/cubiccm/potatoplus/releases/latest/download/updates.json

XIOC detected URL: https://github.com/cubiccm/potatoplus/releases/latest/download/updates.json

extracted_from_files

IP
detected IP: ::bef

XIOC detected IP: ::bef

extracted_from_files

IP
detected IP: 9::bef

XIOC detected IP: 9::bef

extracted_from_files

IP
detected IP: a::bef

XIOC detected IP: a::bef

extracted_from_files

IP
detected IP: ed::af

XIOC detected IP: ed::af

extracted_from_files

IP
detected IP: d::af

XIOC detected IP: d::af

extracted_from_files

IP
detected IP: ::af

XIOC detected IP: ::af

extracted_from_files

IP
detected IP: e::af

XIOC detected IP: e::af

extracted_from_files

IP
detected IP: aded::bef

XIOC detected IP: aded::bef

extracted_from_files

IP
detected IP: face::af

XIOC detected IP: face::af

extracted_from_files

IP
detected IP: ed::bef

XIOC detected IP: ed::bef

extracted_from_files

IP
detected IP: fab::bef

XIOC detected IP: fab::bef

extracted_from_files

IP
detected IP: fab::

XIOC detected IP: fab::

extracted_from_files

IP
detected IP: face::bef

XIOC detected IP: face::bef

extracted_from_files

IP
detected IP: d::bef

XIOC detected IP: d::bef

extracted_from_files

IP
detected IP: ea::

XIOC detected IP: ea::

extracted_from_files

IP
detected IP: ab::

XIOC detected IP: ab::

extracted_from_files

IP
detected IP: b::af

XIOC detected IP: b::af

extracted_from_files

IP
detected IP: b::bef

XIOC detected IP: b::bef

extracted_from_files

IP
detected IP: ded::bef

XIOC detected IP: ded::bef

extracted_from_files

IP
detected IP: ded::af

XIOC detected IP: ded::af

extracted_from_files

IP
detected IP: aded::af

XIOC detected IP: aded::af

extracted_from_files

Domain
detected Domain: ns.adobe.com

XIOC detected Domain: ns.adobe.com

extracted_from_files

Domain
detected Domain: 2.gr

XIOC detected Domain: 2.gr

extracted_from_files

Domain
detected Domain: w.sky

XIOC detected Domain: w.sky

extracted_from_files

Domain
detected Domain: m.ke

XIOC detected Domain: m.ke

extracted_from_files

Domain
detected Domain: www.nju.edu.cn

XIOC detected Domain: www.nju.edu.cn

extracted_from_files

Domain
detected Domain: pjw-console-icon.info

XIOC detected Domain: pjw-console-icon.info

extracted_from_files

Domain
detected Domain: pjw-classlist-heading-switch-button.off

XIOC detected Domain: pjw-classlist-heading-switch-button.off

extracted_from_files

Domain
detected Domain: index.do

XIOC detected Domain: index.do

extracted_from_files

Domain
detected Domain: xk.nju.edu.cn

XIOC detected Domain: xk.nju.edu.cn

extracted_from_files

Domain
detected Domain: grablessons.do

XIOC detected Domain: grablessons.do

extracted_from_files

Domain
detected Domain: window.chrome

XIOC detected Domain: window.chrome

extracted_from_files

Domain
detected Domain: b.bw

XIOC detected Domain: b.bw

extracted_from_files

Domain
detected Domain: q.mc

XIOC detected Domain: q.mc

extracted_from_files

URL
detected Domain: purl.org

XIOC detected Domain: purl.org

extracted_from_files

Domain
detected Domain: publiccourselist.do

XIOC detected Domain: publiccourselist.do

extracted_from_files

Domain
detected Domain: artlist.do

XIOC detected Domain: artlist.do

extracted_from_files

Domain
detected Domain: discuss.do

XIOC detected Domain: discuss.do

extracted_from_files

Domain
detected Domain: readcourselist.do

XIOC detected Domain: readcourselist.do

extracted_from_files

Domain
detected Domain: commonrenew.do

XIOC detected Domain: commonrenew.do

extracted_from_files

Domain
detected Domain: readrenewcourselist.do

XIOC detected Domain: readrenewcourselist.do

extracted_from_files

Domain
detected Domain: gymclasslist.do

XIOC detected Domain: gymclasslist.do

extracted_from_files

Domain
detected Domain: exit.do

XIOC detected Domain: exit.do

extracted_from_files

Domain
detected Domain: login.do

XIOC detected Domain: login.do

extracted_from_files

Domain
detected Domain: courselist.do

XIOC detected Domain: courselist.do

extracted_from_files

Domain
detected Domain: achievementinfo.do

XIOC detected Domain: achievementinfo.do

extracted_from_files

Domain
detected Domain: allcourselist.do

XIOC detected Domain: allcourselist.do

extracted_from_files

Domain
detected Domain: courseeval.do

XIOC detected Domain: courseeval.do

extracted_from_files

Domain
detected Domain: open.do

XIOC detected Domain: open.do

extracted_from_files

Domain
detected Domain: n.call

XIOC detected Domain: n.call

extracted_from_files

Domain
detected Domain: s.map

XIOC detected Domain: s.map

extracted_from_files

Domain
detected Domain: s.call

XIOC detected Domain: s.call

extracted_from_files

Domain
detected Domain: o.call

XIOC detected Domain: o.call

extracted_from_files

Domain
detected Domain: a.call

XIOC detected Domain: a.call

extracted_from_files

Domain
detected Domain: t.flat.call

XIOC detected Domain: t.flat.call

extracted_from_files

Domain
detected Domain: jquery.org

XIOC detected Domain: jquery.org

extracted_from_files

Domain
detected Domain: n.top

XIOC detected Domain: n.top

extracted_from_files

Domain
detected Domain: se.support

XIOC detected Domain: se.support

extracted_from_files

Domain
detected Domain: a.id

XIOC detected Domain: a.id

extracted_from_files

Domain
detected Domain: i.call

XIOC detected Domain: i.call

extracted_from_files

Domain
detected Domain: u.call

XIOC detected Domain: u.call

extracted_from_files

Domain
detected Domain: n.style.top

XIOC detected Domain: n.style.top

extracted_from_files

Domain
detected Domain: t.id

XIOC detected Domain: t.id

extracted_from_files

Domain
detected Domain: bt.data

XIOC detected Domain: bt.data

extracted_from_files

Domain
detected Domain: e.next

XIOC detected Domain: e.next

extracted_from_files

Domain
detected Domain: e.id

XIOC detected Domain: e.id

extracted_from_files

Domain
detected Domain: j.call

XIOC detected Domain: j.call

extracted_from_files

Domain
detected Domain: c.call

XIOC detected Domain: c.call

extracted_from_files

Domain
detected Domain: b.find.id

XIOC detected Domain: b.find.id

extracted_from_files

Domain
detected Domain: b.filter.id

XIOC detected Domain: b.filter.id

extracted_from_files

Domain
detected Domain: o.empty.fire

XIOC detected Domain: o.empty.fire

extracted_from_files

Domain
detected Domain: t.map

XIOC detected Domain: t.map

extracted_from_files

Domain
detected Domain: r.call

XIOC detected Domain: r.call

extracted_from_files

Domain
detected Domain: l.call

XIOC detected Domain: l.call

extracted_from_files

Domain
detected Domain: e.name

XIOC detected Domain: e.name

extracted_from_files

Domain
detected Domain: e.call

XIOC detected Domain: e.call

extracted_from_files

Domain
detected Domain: se.select

XIOC detected Domain: se.select

extracted_from_files

Domain
detected Domain: f.add.call

XIOC detected Domain: f.add.call

extracted_from_files

Domain
detected Domain: f.setup.call

XIOC detected Domain: f.setup.call

extracted_from_files

Domain
detected Domain: v.events

XIOC detected Domain: v.events

extracted_from_files

Domain
detected Domain: ge.td

XIOC detected Domain: ge.td

extracted_from_files

Domain
detected Domain: ge.th

XIOC detected Domain: ge.th

extracted_from_files

Domain
detected Domain: this.show

XIOC detected Domain: this.show

extracted_from_files

Domain
detected Domain: s.style

XIOC detected Domain: s.style

extracted_from_files

Domain
detected Domain: o.data

XIOC detected Domain: o.data

extracted_from_files

Domain
detected Domain: u.data

XIOC detected Domain: u.data

extracted_from_files

Domain
detected Domain: s.event.handlers.call

XIOC detected Domain: s.event.handlers.call

extracted_from_files

Domain
detected Domain: c.predispatch.call

XIOC detected Domain: c.predispatch.call

extracted_from_files

Domain
detected Domain: f.teardown.call

XIOC detected Domain: f.teardown.call

extracted_from_files

Domain
detected Domain: f.remove.call

XIOC detected Domain: f.remove.call

extracted_from_files

Domain
detected Domain: s.event.global

XIOC detected Domain: s.event.global

extracted_from_files

Domain
detected Domain: d.call

XIOC detected Domain: d.call

extracted_from_files

Domain
detected Domain: this.off

XIOC detected Domain: this.off

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: this.target

XIOC detected Domain: this.target

extracted_from_files

Domain
detected Domain: t.click

XIOC detected Domain: t.click

extracted_from_files

Domain
detected Domain: e.target

XIOC detected Domain: e.target

extracted_from_files

Domain
detected Domain: c.postdispatch.call

XIOC detected Domain: c.postdispatch.call

extracted_from_files

Domain
detected Domain: this.options.step.call

XIOC detected Domain: this.options.step.call

extracted_from_files

Domain
detected Domain: this.now

XIOC detected Domain: this.now

extracted_from_files

Domain
detected Domain: l.style

XIOC detected Domain: l.style

extracted_from_files

Domain
detected Domain: e.top

XIOC detected Domain: e.top

extracted_from_files

Domain
detected Domain: e.style

XIOC detected Domain: e.style

extracted_from_files

Domain
detected Domain: this.map

XIOC detected Domain: this.map

extracted_from_files

Domain
detected Domain: t.events

XIOC detected Domain: t.events

extracted_from_files

Domain
detected Domain: r.old.call

XIOC detected Domain: r.old.call

extracted_from_files

Domain
detected Domain: s.fx.off

XIOC detected Domain: s.fx.off

extracted_from_files

Domain
detected Domain: a.empty.fire

XIOC detected Domain: a.empty.fire

extracted_from_files

Domain
detected Domain: l.opts.fail

XIOC detected Domain: l.opts.fail

extracted_from_files

Domain
detected Domain: l.opts.start.call

XIOC detected Domain: l.opts.start.call

extracted_from_files

Domain
detected Domain: e.now

XIOC detected Domain: e.now

extracted_from_files

Domain
detected Domain: e.elem.style

XIOC detected Domain: e.elem.style

extracted_from_files

Domain
detected Domain: v.data

XIOC detected Domain: v.data

extracted_from_files

Domain
detected Domain: r.host

XIOC detected Domain: r.host

extracted_from_files

Domain
detected Domain: wt.host

XIOC detected Domain: wt.host

extracted_from_files

Domain
detected Domain: t.name

XIOC detected Domain: t.name

extracted_from_files

Domain
detected Domain: this.name

XIOC detected Domain: this.name

extracted_from_files

Domain
detected Domain: finish.call

XIOC detected Domain: finish.call

extracted_from_files

Domain
detected Domain: r.stop.call

XIOC detected Domain: r.stop.call

extracted_from_files

Domain
detected Domain: e.data

XIOC detected Domain: e.data

extracted_from_files

Domain
detected Domain: i.data

XIOC detected Domain: i.data

extracted_from_files

Domain
detected Domain: r.open

XIOC detected Domain: r.open

extracted_from_files

Domain
detected Domain: s.data

XIOC detected Domain: s.data

extracted_from_files

Domain
detected Domain: t.fail

XIOC detected Domain: t.fail

extracted_from_files

Domain
detected Domain: v.beforesend.call

XIOC detected Domain: v.beforesend.call

extracted_from_files

Domain
detected Domain: v.global

XIOC detected Domain: v.global

extracted_from_files

Domain
detected Domain: o.next

XIOC detected Domain: o.next

extracted_from_files

Domain
detected Domain: object.prototype.hasownproperty.call

XIOC detected Domain: object.prototype.hasownproperty.call

extracted_from_files

Domain
detected Domain: s.now

XIOC detected Domain: s.now

extracted_from_files

Domain
detected Domain: t.using.call

XIOC detected Domain: t.using.call

extracted_from_files

Domain
detected Domain: t.top-s.top

XIOC detected Domain: t.top-s.top

extracted_from_files

Domain
detected Domain: f.top

XIOC detected Domain: f.top

extracted_from_files

Domain
detected Domain: t.top

XIOC detected Domain: t.top

extracted_from_files

Domain
detected Domain: e.prototype.open

XIOC detected Domain: e.prototype.open

extracted_from_files

Domain
detected Domain: ht.open

XIOC detected Domain: ht.open

extracted_from_files

Domain
detected Domain: this.foundation

XIOC detected Domain: this.foundation

extracted_from_files

Domain
detected Domain: n.next

XIOC detected Domain: n.next

extracted_from_files

Domain
detected Domain: u.next

XIOC detected Domain: u.next

extracted_from_files

Domain
detected Domain: slice.call

XIOC detected Domain: slice.call

extracted_from_files

Domain
detected Domain: array.prototype.slice.call

XIOC detected Domain: array.prototype.slice.call

extracted_from_files

Domain
detected Domain: this.unboundedcoords.top

XIOC detected Domain: this.unboundedcoords.top

extracted_from_files

Domain
detected Domain: i.next

XIOC detected Domain: i.next

extracted_from_files

Domain
detected Domain: e.cssclasses.bg

XIOC detected Domain: e.cssclasses.bg

extracted_from_files

Domain
detected Domain: n.style

XIOC detected Domain: n.style

extracted_from_files

Domain
detected Domain: this.foundation.open

XIOC detected Domain: this.foundation.open

extracted_from_files

Domain
detected Domain: t.prototype.destroy.call

XIOC detected Domain: t.prototype.destroy.call

extracted_from_files

Domain
detected Domain: t.target

XIOC detected Domain: t.target

extracted_from_files

Domain
detected Domain: kt.click

XIOC detected Domain: kt.click

extracted_from_files

Domain
detected Domain: this.data

XIOC detected Domain: this.data

extracted_from_files

Domain
detected Domain: qt.page

XIOC detected Domain: qt.page

extracted_from_files

Domain
detected Domain: a.next

XIOC detected Domain: a.next

extracted_from_files

Domain
detected Domain: e.set.call

XIOC detected Domain: e.set.call

extracted_from_files

Hash
detected MD5 Hash: 8A000000FFEC407A00000000FFEC407A

XIOC detected MD5 Hash: 8A000000FFEC407A00000000FFEC407A

extracted_from_files

URL
detected URL: https://edge.microsoft.com/extensionwebstorebase/v1/crx

XIOC detected URL: https://edge.microsoft.com/extensionwebstorebase/v1/crx

extracted_from_files

IP
detected IP: e::bef

XIOC detected IP: e::bef

extracted_from_files

Domain
detected Domain: this.root.id

XIOC detected Domain: this.root.id

extracted_from_files

Domain
detected Domain: re.tab

XIOC detected Domain: re.tab

extracted_from_files

Domain
detected Domain: i.top

XIOC detected Domain: i.top

extracted_from_files

Domain
detected Domain: re.ie

XIOC detected Domain: re.ie

extracted_from_files

Domain
detected Domain: yt.tab

XIOC detected Domain: yt.tab

extracted_from_files

Domain
detected Domain: me.in

XIOC detected Domain: me.in

extracted_from_files

Domain
detected Domain: this.observer

XIOC detected Domain: this.observer

extracted_from_files

Domain
detected Domain: i.observer

XIOC detected Domain: i.observer

extracted_from_files

Domain
detected Domain: this.foundation.select

XIOC detected Domain: this.foundation.select

extracted_from_files

Domain
detected Domain: o.id

XIOC detected Domain: o.id

extracted_from_files

Domain
detected Domain: this.select

XIOC detected Domain: this.select

extracted_from_files

Domain
detected Domain: e.prototype.select

XIOC detected Domain: e.prototype.select

extracted_from_files

Domain
detected Domain: this.open

XIOC detected Domain: this.open

extracted_from_files

Domain
detected Domain: in.open

XIOC detected Domain: in.open

extracted_from_files

Domain
detected Domain: un.radio

XIOC detected Domain: un.radio

extracted_from_files

Domain
detected Domain: array.prototype.foreach.call

XIOC detected Domain: array.prototype.foreach.call

extracted_from_files

Domain
detected Domain: t.defaultbutton.click

XIOC detected Domain: t.defaultbutton.click

extracted_from_files

Domain
detected Domain: foreach.call

XIOC detected Domain: foreach.call

extracted_from_files

Domain
detected Domain: xe.open

XIOC detected Domain: xe.open

extracted_from_files

Domain
detected Domain: t.open

XIOC detected Domain: t.open

extracted_from_files

Domain
detected Domain: rn.top

XIOC detected Domain: rn.top

extracted_from_files

Domain
detected Domain: t.center

XIOC detected Domain: t.center

extracted_from_files

Domain
detected Domain: vn.data

XIOC detected Domain: vn.data

extracted_from_files

Domain
detected Domain: this.click

XIOC detected Domain: this.click

extracted_from_files

Domain
detected Domain: i.click

XIOC detected Domain: i.click

extracted_from_files

Domain
detected Domain: dn.open

XIOC detected Domain: dn.open

extracted_from_files

Domain
detected Domain: jn.menu

XIOC detected Domain: jn.menu

extracted_from_files

Domain
detected Domain: e.height-this.anchormargin.top

XIOC detected Domain: e.height-this.anchormargin.top

extracted_from_files

Domain
detected Domain: a.height-this.anchormargin.top

XIOC detected Domain: a.height-this.anchormargin.top

extracted_from_files

Domain
detected Domain: o.top

XIOC detected Domain: o.top

extracted_from_files

Domain
detected Domain: e.cssclasses.is

XIOC detected Domain: e.cssclasses.is

extracted_from_files

Domain
detected Domain: e.cssclasses.open

XIOC detected Domain: e.cssclasses.open

extracted_from_files

Domain
detected Domain: this.anchormargin.top

XIOC detected Domain: this.anchormargin.top

extracted_from_files

Domain
detected Domain: bi.menu

XIOC detected Domain: bi.menu

extracted_from_files

Domain
detected Domain: this.menu.items.map

XIOC detected Domain: this.menu.items.map

extracted_from_files

Domain
detected Domain: bi.select

XIOC detected Domain: bi.select

extracted_from_files

Domain
detected Domain: vi.menu

XIOC detected Domain: vi.menu

extracted_from_files

Domain
detected Domain: this.segmentslist.map

XIOC detected Domain: this.segmentslist.map

extracted_from_files

Domain
detected Domain: ui.no

XIOC detected Domain: ui.no

extracted_from_files

Domain
detected Domain: this.menusurface.open

XIOC detected Domain: this.menusurface.open

extracted_from_files

Domain
detected Domain: t.foundation

XIOC detected Domain: t.foundation

extracted_from_files

Domain
detected Domain: t.prototype.init.call

XIOC detected Domain: t.prototype.init.call

extracted_from_files

Domain
detected Domain: c.next

XIOC detected Domain: c.next

extracted_from_files

Domain
detected Domain: xi.open

XIOC detected Domain: xi.open

extracted_from_files

Domain
detected Domain: bi.data

XIOC detected Domain: bi.data

extracted_from_files

Domain
detected Domain: t.menu.open

XIOC detected Domain: t.menu.open

extracted_from_files

Domain
detected Domain: this.menu

XIOC detected Domain: this.menu

extracted_from_files

Domain
detected Domain: s.next

XIOC detected Domain: s.next

extracted_from_files

Domain
detected Domain: qr.tab

XIOC detected Domain: qr.tab

extracted_from_files

Domain
detected Domain: jr.space

XIOC detected Domain: jr.space

extracted_from_files

Domain
detected Domain: gr.space

XIOC detected Domain: gr.space

extracted_from_files

Domain
detected Domain: wr.strings.tab

XIOC detected Domain: wr.strings.tab

extracted_from_files

Domain
detected Domain: this.id

XIOC detected Domain: this.id

extracted_from_files

Domain
detected Domain: hr.cssclasses.no

XIOC detected Domain: hr.cssclasses.no

extracted_from_files

Domain
detected Domain: io.center

XIOC detected Domain: io.center

extracted_from_files

Domain
detected Domain: e.prototype.show

XIOC detected Domain: e.prototype.show

extracted_from_files

Domain
detected Domain: e.show

XIOC detected Domain: e.show

extracted_from_files

Domain
detected Domain: t.show

XIOC detected Domain: t.show

extracted_from_files

Domain
detected Domain: bo.show

XIOC detected Domain: bo.show

extracted_from_files

Domain
detected Domain: qr.rich

XIOC detected Domain: qr.rich

extracted_from_files

Domain
detected Domain: t.rich

XIOC detected Domain: t.rich

extracted_from_files

Domain
detected Domain: ro.top

XIOC detected Domain: ro.top

extracted_from_files

Domain
detected Domain: g.next

XIOC detected Domain: g.next

extracted_from_files

Domain
detected Domain: d.next

XIOC detected Domain: d.next

extracted_from_files

Domain
detected Domain: this.anchorrect.top

XIOC detected Domain: this.anchorrect.top

extracted_from_files

Domain
detected Domain: do.center

XIOC detected Domain: do.center

extracted_from_files

Domain
detected Domain: no.top

XIOC detected Domain: no.top

extracted_from_files

Domain
detected Domain: no.center

XIOC detected Domain: no.center

extracted_from_files

Domain
detected Domain: courseinfoelective.do

XIOC detected Domain: courseinfoelective.do

extracted_from_files

Domain
detected Domain: pjw.site

XIOC detected Domain: pjw.site

extracted_from_files

Domain
detected Domain: imgdata.data

XIOC detected Domain: imgdata.data

extracted_from_files

Domain
detected Domain: img.data

XIOC detected Domain: img.data

extracted_from_files

Domain
detected Domain: github.com

XIOC detected Domain: github.com

extracted_from_files

Domain
detected Domain: e.map

XIOC detected Domain: e.map

extracted_from_files

Domain
detected Domain: ro.center

XIOC detected Domain: ro.center

extracted_from_files

Domain
detected Domain: menu.menusurface.open

XIOC detected Domain: menu.menusurface.open

extracted_from_files

Domain
detected Domain: e.data.target.select

XIOC detected Domain: e.data.target.select

extracted_from_files

URL
detected URL: https://github.com/cubiccm/potatoplus/releases/latest/download/PotatoPlus.xpi

XIOC detected URL: https://github.com/cubiccm/potatoplus/releases/latest/download/PotatoPlus.xpi

extracted_from_files

URL
detected URL: https://microsoftedge.microsoft.com/addons/detail/potatoplus/miofoebmeohjbieochdmaolpaneapmib

XIOC detected URL: https://microsoftedge.microsoft.com/addons/detail/potatoplus/miofoebmeohjbieochdmaolpaneapmib

extracted_from_files

URL
detected URL: https://chrome.google.com/webstore/detail/potatoplus/mokphlegfcilcbnjmhgfikjgnbnconba

XIOC detected URL: https://chrome.google.com/webstore/detail/potatoplus/mokphlegfcilcbnjmhgfikjgnbnconba

extracted_from_files

Domain
detected Domain: data.select

XIOC detected Domain: data.select

extracted_from_files

Domain
detected Domain: data.info

XIOC detected Domain: data.info

extracted_from_files

Domain
detected Domain: this.search

XIOC detected Domain: this.search

extracted_from_files

Domain
detected Domain: data.info.map

XIOC detected Domain: data.info.map

extracted_from_files

Domain
detected Domain: target.data

XIOC detected Domain: target.data

extracted_from_files

Domain
detected Domain: this.auto

XIOC detected Domain: this.auto

extracted_from_files

Domain
detected Domain: e.data.target.data

XIOC detected Domain: e.data.target.data

extracted_from_files

Domain
detected Domain: e.data.target.list.search

XIOC detected Domain: e.data.target.list.search

extracted_from_files

Domain
detected Domain: mdc.menu.corner.top

XIOC detected Domain: mdc.menu.corner.top

extracted_from_files

Domain
detected Domain: panel.show

XIOC detected Domain: panel.show

extracted_from_files

Domain
detected Domain: this.is

XIOC detected Domain: this.is

extracted_from_files

Domain
detected Domain: window.auto

XIOC detected Domain: window.auto

extracted_from_files

Domain
detected Domain: word.search

XIOC detected Domain: word.search

extracted_from_files

Domain
detected Domain: obj.show

XIOC detected Domain: obj.show

extracted_from_files

Domain
detected Domain: item.data

XIOC detected Domain: item.data

extracted_from_files

Domain
detected Domain: b.id

XIOC detected Domain: b.id

extracted_from_files

Domain
detected Domain: www.googletagmanager.com

XIOC detected Domain: www.googletagmanager.com

extracted_from_files

Domain
detected Domain: e.data.target

XIOC detected Domain: e.data.target

extracted_from_files

Domain
detected Domain: e.data.target.show

XIOC detected Domain: e.data.target.show

extracted_from_files

Domain
detected Domain: list.console.info

XIOC detected Domain: list.console.info

extracted_from_files

Domain
detected Domain: e.data.target.is

XIOC detected Domain: e.data.target.is

extracted_from_files

Domain
detected Domain: e.data.target.search

XIOC detected Domain: e.data.target.search

extracted_from_files

Domain
detected Domain: e.data.space

XIOC detected Domain: e.data.space

extracted_from_files

Domain
detected Domain: window.open

XIOC detected Domain: window.open

extracted_from_files

Domain
detected Domain: window.click

XIOC detected Domain: window.click

extracted_from_files

Domain
detected Domain: window.location.host

XIOC detected Domain: window.location.host

extracted_from_files

Domain
detected Domain: pjw.data

XIOC detected Domain: pjw.data

extracted_from_files

Domain
detected Domain: stackoverflow.com

XIOC detected Domain: stackoverflow.com

extracted_from_files

Domain
detected Domain: jw.nju.edu.cn

XIOC detected Domain: jw.nju.edu.cn

extracted_from_files

Domain
detected Domain: cubiccm.ddns.net

XIOC detected Domain: cubiccm.ddns.net

extracted_from_files

Domain
detected Domain: studentinfo.do

XIOC detected Domain: studentinfo.do

extracted_from_files

Domain
detected Domain: list.selectors.major.dom.show

XIOC detected Domain: list.selectors.major.dom.show

extracted_from_files

Domain
detected Domain: e.data.dialog.open

XIOC detected Domain: e.data.dialog.open

extracted_from_files

Domain
detected Domain: target.show

XIOC detected Domain: target.show

extracted_from_files

Domain
detected Domain: gmail.com

XIOC detected Domain: gmail.com

extracted_from_files

Domain
detected Domain: e.originalevent.data

XIOC detected Domain: e.originalevent.data

extracted_from_files

Domain
detected Domain: pjw.preferences.is

XIOC detected Domain: pjw.preferences.is

extracted_from_files

Domain
detected Domain: div.pjw-class-weekcal-heading-day.select

XIOC detected Domain: div.pjw-class-weekcal-heading-day.select

extracted_from_files

Domain
detected Domain: courseresult.do

XIOC detected Domain: courseresult.do

extracted_from_files

Domain
detected Domain: pjw.data.my

XIOC detected Domain: pjw.data.my

extracted_from_files

Domain
detected Domain: space.cal

XIOC detected Domain: space.cal

extracted_from_files

Domain
detected Domain: space.data

XIOC detected Domain: space.data

extracted_from_files

Domain
detected Domain: window.location.search

XIOC detected Domain: window.location.search

extracted_from_files

Domain
detected Domain: item.name

XIOC detected Domain: item.name

extracted_from_files

Domain
detected Domain: cv-mh-4.cv

XIOC detected Domain: cv-mh-4.cv

extracted_from_files

Domain
detected Domain: info.search

XIOC detected Domain: info.search

extracted_from_files

Domain
detected Domain: space.target

XIOC detected Domain: space.target

extracted_from_files

Domain
detected Domain: space.is

XIOC detected Domain: space.is

extracted_from_files

Domain
detected Domain: rule.data

XIOC detected Domain: rule.data

extracted_from_files

Domain
detected Domain: data.id

XIOC detected Domain: data.id

extracted_from_files

Domain
detected Domain: list.search

XIOC detected Domain: list.search

extracted_from_files

Domain
detected Domain: e.data.target.list.select

XIOC detected Domain: e.data.target.list.select

extracted_from_files

Domain
detected Domain: item.credit

XIOC detected Domain: item.credit

extracted_from_files

Domain
detected Domain: deletevolunteer.do

XIOC detected Domain: deletevolunteer.do

extracted_from_files

Domain
detected Domain: volunteer.do

XIOC detected Domain: volunteer.do

extracted_from_files

Domain
detected Domain: studentstatus.do

XIOC detected Domain: studentstatus.do

extracted_from_files

Domain
detected Domain: list.select

XIOC detected Domain: list.select

extracted_from_files

Domain
detected Domain: favorite.do

XIOC detected Domain: favorite.do

extracted_from_files

Domain
detected Domain: res.search

XIOC detected Domain: res.search

extracted_from_files

Domain
detected Domain: selectcourse.do

XIOC detected Domain: selectcourse.do

extracted_from_files

Domain
detected Domain: this.console.info

XIOC detected Domain: this.console.info

extracted_from_files

Domain
detected Domain: publiccourse.do

XIOC detected Domain: publiccourse.do

extracted_from_files

Domain
detected Domain: programcourse.do

XIOC detected Domain: programcourse.do

extracted_from_files

Domain
detected Domain: queryfavorite.do

XIOC detected Domain: queryfavorite.do

extracted_from_files

Domain
detected Domain: querycourse.do

XIOC detected Domain: querycourse.do

extracted_from_files

URL
detected URL: https://www.nju.edu.cn/_upload/tpl/01/36/310/template310/images/logo.png

XIOC detected URL: https://www.nju.edu.cn/_upload/tpl/01/36/310/template310/images/logo.png

extracted_from_files

URL
detected URL: https://fonts.gstatic.com/s/materialiconsround/v107/LDItaoyNOAY6Uewc665JcIzCKsKc_M9flwmPq_HTTw.woff2)

XIOC detected URL: https://fonts.gstatic.com/s/materialiconsround/v107/LDItaoyNOAY6Uewc665JcIzCKsKc_M9flwmPq_HTTw.woff2)

extracted_from_files

Domain
detected Domain: nju.edu.cn

XIOC detected Domain: nju.edu.cn

extracted_from_files

Domain
detected Domain: n.target

XIOC detected Domain: n.target

extracted_from_files

Domain
detected Domain: f.compare

XIOC detected Domain: f.compare

extracted_from_files

Domain
detected Domain: u.target

XIOC detected Domain: u.target

extracted_from_files

Domain
detected Domain: newrow.id

XIOC detected Domain: newrow.id

extracted_from_files

URL
detected URL: https://github.com/cubiccm/potatoplus/releases/latest/download/potatoplus.user.js

XIOC detected URL: https://github.com/cubiccm/potatoplus/releases/latest/download/potatoplus.user.js

extracted_from_files

URL
detected URL: https://cubiccm.ddns.net

XIOC detected URL: https://cubiccm.ddns.net

extracted_from_files

URL
detected URL: https://cubiccm.ddns.net/apps/potatoplus-bulletin/?version=$

XIOC detected URL: https://cubiccm.ddns.net/apps/potatoplus-bulletin/?version=$

extracted_from_files

URL
detected URL: https://cubiccm.ddns.net/potatoplus')

XIOC detected URL: https://cubiccm.ddns.net/potatoplus')

extracted_from_files

URL
detected URL: https://www.googletagmanager.com/gtag/js?id=UA-173014211-1

XIOC detected URL: https://www.googletagmanager.com/gtag/js?id=UA-173014211-1

extracted_from_files

URL
detected URL: https://www.nju.edu.cn/_upload/tpl/01/36/310/template310/images/16.ico

XIOC detected URL: https://www.nju.edu.cn/_upload/tpl/01/36/310/template310/images/16.ico

extracted_from_files

URL
detected URL: https://github.com/leonof/imgRecJs

XIOC detected URL: https://github.com/leonof/imgRecJs

extracted_from_files

URL
detected URL: https://cubiccm.ddns.net/potato-mailing-list/

XIOC detected URL: https://cubiccm.ddns.net/potato-mailing-list/

extracted_from_files

URL
detected URL: https://github.com/cubiccm/potatoplus

XIOC detected URL: https://github.com/cubiccm/potatoplus

extracted_from_files

URL
detected URL: https://cubiccm.ddns.net/potatoplus

XIOC detected URL: https://cubiccm.ddns.net/potatoplus

extracted_from_files

URL
detected URL: https://github.com/cubiccm/potatoplus/releases/latest/

XIOC detected URL: https://github.com/cubiccm/potatoplus/releases/latest/

extracted_from_files

Domain
detected Domain: button.click

XIOC detected Domain: button.click

extracted_from_files

Domain
detected Domain: this.info

XIOC detected Domain: this.info

extracted_from_files

Hash
detected MD5 Hash: 8A000000FF1976D200000000FF1976D2

XIOC detected MD5 Hash: 8A000000FF1976D200000000FF1976D2

extracted_from_files

Domain
detected Domain: r.next

XIOC detected Domain: r.next

extracted_from_files

Security Analysis Summary

Security Analysis Overview

PotatoPlus is a edge extension published by Limos. Version 0.3.10 has been analyzed by the Risky Plugins security platform, receiving a risk score of 100/100 (CRITICAL risk) based on 419 security findings.

Risk Assessment

This extension presents critical security risk. Severe issues were detected, potentially including malware indicators, exposed secrets, or dangerous behaviors. Installation is strongly discouraged until these issues are addressed.

Findings Breakdown

  • High: 38 finding(s)
  • Medium: 364 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

PotatoPlus is published by Limos on the edge marketplace.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions