Is "OpenAPI DevTools" on Firefox Add-ons Safe to Install?
Instantly generate API specifications in real time for any app or website . OpenAPI DevTools generates OpenAPI specifications in real time from network requests. Once installed it adds a new tab to Firefox DevTools called OpenAPI. While the tool is open it automatically converts network requests into a specification. Features: - Instantly generate an OpenAPI 3.1 specification for any website or application just by using it - Automatically merges new request & response headers, bodies, and query parameters per endpoint - Click on a path parameter and the app will automatically merge existing and future matching requests - View the specification inside the tool and download with a click - Export and save a session at any time, or share it with others
Risk Assessment
Pending0 security findings detected across all analyzers
Firefox extension requesting 1 permission
No Threats Detected
This extension passed all security checks
About This Extension
No Findings
All security checks passed
AI Security Report
AI Security Analysis: OpenAPI DevTools
Analysis generated: 2025-12-12T21:44:26+13:00
Model: gemini-3-pro-preview
Quick Facts
| Property | Value |
|---|---|
| UUID | c20e2852-e8c7-5bd6-8a2f-7d70523b414b |
| Type | firefox |
| Version | |
| Users | 192 |
| Risk Score | 100.0/100 (CRITICAL) |
| Malware Detected | ⚠️ Yes |
| Secrets Exposed | ✅ No |
| Critical Vulns | ✅ No |
AI Analysis
Executive Summary
The "OpenAPI DevTools" extension presents a CRITICAL security risk and should be blocked or removed immediately. The analysis detected 27 high-severity malware signatures indicating capabilities typically associated with system-level compromise, including registry modification, persistence mechanisms, and system command execution. Combined with a low user count (192), an unverified publisher, and heavy code obfuscation, this extension exhibits the characteristics of a malicious payload or a severely compromised software supply chain.
Threat Assessment
The security posture of this extension is extremely poor. The findings suggest the extension contains code capable of actions far outside the scope of a standard developer tool.
- Malware Capabilities: The presence of YARA rules such as
postinstall_registry_modification,postinstall_persistence_mechanism, andpostinstall_system_commandis highly alarming. Browser extensions operate within a sandbox; finding code designed to modify the Windows Registry or execute system commands suggests either an attempt to escape the browser sandbox (potentially via a Native Messaging Host) or the inclusion of a compromised dependency that contains a malicious payload. - Obfuscation: The analysis identified "Heavy Unicode" obfuscation in
assets/panel-5aa7c38e.js. While minification is common in extensions, heavy obfuscation is a tactic frequently used by malware authors to bypass static analysis and hide malicious logic. - Supply Chain / Build Hygiene: The sheer volume of findings (2,128 total), particularly the "postinstall" signatures, suggests the developer may have bundled a massive number of dependencies (including
node_modules) without proper cleaning. However, the specific nature of the signatures (persistence, crypto operations) makes this indistinguishable from active malware without manual code review. - Publisher Trust: The publisher "Andrew Walsh" is unverified, and the extension has a very low user base (192 users), providing no community reputation to offset the technical red flags.
Risk Justification
Risk Score: 100.0/100 (CRITICAL)
This score is justified. The extension triggers multiple high-severity indicators that are characteristic of malware, not legitimate software.
- Severity of Capabilities: Code capable of registry modification and persistence is unacceptable in a browser extension.
- Intent to Hide: Heavy obfuscation prevents security verification.
- Lack of Trust: There is no verified identity or significant user base to vouch for the extension's legitimacy.
- Volume of IOCs: Over 2,000 indicators of compromise suggests a highly "noisy" or contaminated codebase.
Key Findings
- System Manipulation Signatures: Multiple YARA matches for
postinstall_registry_modificationandpostinstall_persistence_mechanismindicate code intended to alter the host operating system and survive reboots. - Command Execution: The
postinstall_system_commandfinding suggests the extension contains logic to execute arbitrary shell commands. - Heavy Obfuscation: The file
assets/panel-5aa7c38e.jscontains "unicode_heavy" obfuscation, making it difficult to determine what the main panel logic is actually doing. - Suspicious Network Activity: Matches for
postinstall_file_downloadandpostinstall_network_communicationsuggest the extension may attempt to download additional payloads after installation. - Credential Exposure Risk: The signature
credential_env_filessuggests the developer may have accidentally bundled environment files containing secrets or API keys.
Recommendations
- Immediate Removal: Uninstall this extension from all browsers immediately.
- Blocklist: Add the UUID
c20e2852-e8c7-5bd6-8a2f-7d70523b414bto the organization's browser management blocklist. - Incident Response: If this extension was installed on a machine with access to sensitive production data or secrets, trigger an incident response process to scan for persistence mechanisms (registry keys, scheduled tasks) and potential data exfiltration.
- Credential Rotation: If the extension was used while authenticated to sensitive OpenAPI endpoints, rotate the relevant API keys and tokens.
Mitigation Strategies
Given the Risk Score of 100, mitigation is not recommended. The extension should not be used.
However, if usage is strictly required for forensic analysis:
- Isolation: Run the extension only inside a disposable, non-networked Virtual Machine (VM) or a sandbox environment that resets after use.
- Network Blocking: Configure a firewall to block all traffic from the browser instance except for the specific localhost or internal API being tested.
- No Secrets: Do not use this extension with production credentials or real user data.
Confidence Assessment
Confidence Level: 80%
While the YARA signatures are definitive regarding the presence of suspicious code patterns, there is a possibility (approx. 20%) that these findings result from extremely poor build practices—specifically, bundling a full node_modules directory containing malicious or aggressive install scripts that are technically present in the file system but cannot execute within the browser's runtime environment. However, given the presence of obfuscation and the severity of the signatures, we must treat the threat as active and critical until proven otherwise.
Disclaimer
This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace