Is "OpenAPI DevTools" on Firefox Add-ons Safe to Install?

Andrew Walsh · firefox · v1.5.2

Instantly generate API specifications in real time for any app or website . OpenAPI DevTools generates OpenAPI specifications in real time from network requests. Once installed it adds a new tab to Firefox DevTools called OpenAPI. While the tool is open it automatically converts network requests into a specification. Features: - Instantly generate an OpenAPI 3.1 specification for any website or application just by using it - Automatically merges new request & response headers, bodies, and query parameters per endpoint - Click on a path parameter and the app will automatically merge existing and future matching requests - View the specification inside the tool and download with a click - Export and save a session at any time, or share it with others

Risk Assessment

Pending
0
out of 100
MINIMAL

0 security findings detected across all analyzers

Firefox extension requesting 1 permission

No Threats Detected

This extension passed all security checks

About This Extension

Instantly generate API specifications in real time for any app or website . OpenAPI DevTools generates OpenAPI specifications in real time from network requests. Once installed it adds a new tab to Firefox DevTools called OpenAPI. While the tool is open it automatically converts network requests into a specification. Features: - Instantly generate an OpenAPI 3.1 specification for any website or application just by using it - Automatically merges new request & response headers, bodies, and query parameters per endpoint - Click on a path parameter and the app will automatically merge existing and future matching requests - View the specification inside the tool and download with a click - Export and save a session at any time, or share it with others

No Findings

All security checks passed

AI Security Report

AI Security Analysis: OpenAPI DevTools

Analysis generated: 2025-12-12T21:44:26+13:00
Model: gemini-3-pro-preview


Quick Facts

Property Value
UUID c20e2852-e8c7-5bd6-8a2f-7d70523b414b
Type firefox
Version
Users 192
Risk Score 100.0/100 (CRITICAL)
Malware Detected ⚠️ Yes
Secrets Exposed ✅ No
Critical Vulns ✅ No

AI Analysis

Executive Summary

The "OpenAPI DevTools" extension presents a CRITICAL security risk and should be blocked or removed immediately. The analysis detected 27 high-severity malware signatures indicating capabilities typically associated with system-level compromise, including registry modification, persistence mechanisms, and system command execution. Combined with a low user count (192), an unverified publisher, and heavy code obfuscation, this extension exhibits the characteristics of a malicious payload or a severely compromised software supply chain.

Threat Assessment

The security posture of this extension is extremely poor. The findings suggest the extension contains code capable of actions far outside the scope of a standard developer tool.

  • Malware Capabilities: The presence of YARA rules such as postinstall_registry_modification, postinstall_persistence_mechanism, and postinstall_system_command is highly alarming. Browser extensions operate within a sandbox; finding code designed to modify the Windows Registry or execute system commands suggests either an attempt to escape the browser sandbox (potentially via a Native Messaging Host) or the inclusion of a compromised dependency that contains a malicious payload.
  • Obfuscation: The analysis identified "Heavy Unicode" obfuscation in assets/panel-5aa7c38e.js. While minification is common in extensions, heavy obfuscation is a tactic frequently used by malware authors to bypass static analysis and hide malicious logic.
  • Supply Chain / Build Hygiene: The sheer volume of findings (2,128 total), particularly the "postinstall" signatures, suggests the developer may have bundled a massive number of dependencies (including node_modules) without proper cleaning. However, the specific nature of the signatures (persistence, crypto operations) makes this indistinguishable from active malware without manual code review.
  • Publisher Trust: The publisher "Andrew Walsh" is unverified, and the extension has a very low user base (192 users), providing no community reputation to offset the technical red flags.

Risk Justification

Risk Score: 100.0/100 (CRITICAL)

This score is justified. The extension triggers multiple high-severity indicators that are characteristic of malware, not legitimate software.

  1. Severity of Capabilities: Code capable of registry modification and persistence is unacceptable in a browser extension.
  2. Intent to Hide: Heavy obfuscation prevents security verification.
  3. Lack of Trust: There is no verified identity or significant user base to vouch for the extension's legitimacy.
  4. Volume of IOCs: Over 2,000 indicators of compromise suggests a highly "noisy" or contaminated codebase.

Key Findings

  • System Manipulation Signatures: Multiple YARA matches for postinstall_registry_modification and postinstall_persistence_mechanism indicate code intended to alter the host operating system and survive reboots.
  • Command Execution: The postinstall_system_command finding suggests the extension contains logic to execute arbitrary shell commands.
  • Heavy Obfuscation: The file assets/panel-5aa7c38e.js contains "unicode_heavy" obfuscation, making it difficult to determine what the main panel logic is actually doing.
  • Suspicious Network Activity: Matches for postinstall_file_download and postinstall_network_communication suggest the extension may attempt to download additional payloads after installation.
  • Credential Exposure Risk: The signature credential_env_files suggests the developer may have accidentally bundled environment files containing secrets or API keys.

Recommendations

  1. Immediate Removal: Uninstall this extension from all browsers immediately.
  2. Blocklist: Add the UUID c20e2852-e8c7-5bd6-8a2f-7d70523b414b to the organization's browser management blocklist.
  3. Incident Response: If this extension was installed on a machine with access to sensitive production data or secrets, trigger an incident response process to scan for persistence mechanisms (registry keys, scheduled tasks) and potential data exfiltration.
  4. Credential Rotation: If the extension was used while authenticated to sensitive OpenAPI endpoints, rotate the relevant API keys and tokens.

Mitigation Strategies

Given the Risk Score of 100, mitigation is not recommended. The extension should not be used.

However, if usage is strictly required for forensic analysis:

  1. Isolation: Run the extension only inside a disposable, non-networked Virtual Machine (VM) or a sandbox environment that resets after use.
  2. Network Blocking: Configure a firewall to block all traffic from the browser instance except for the specific localhost or internal API being tested.
  3. No Secrets: Do not use this extension with production credentials or real user data.

Confidence Assessment

Confidence Level: 80%

While the YARA signatures are definitive regarding the presence of suspicious code patterns, there is a possibility (approx. 20%) that these findings result from extremely poor build practices—specifically, bundling a full node_modules directory containing malicious or aggressive install scripts that are technically present in the file system but cannot execute within the browser's runtime environment. However, given the presence of obfuscation and the severity of the signatures, we must treat the threat as active and critical until proven otherwise.


Disclaimer

This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.

Frequently Asked Questions