Is "Talishar 日本語化+オーバーレイ表示" on Chrome Web Store Safe to Install?

[email protected] · chrome · v1.9.6

導入後は拡張機能のアイコンをタップし、機能の確認をしてください 翻訳の調整、別カードのテキスト混入等は少しずつ対応していきます 拡張機能アイコンから、サポートをして貰えたら励みになります 更新情報 ver1.9.5 メニューにてヒントにビギナーとベーシックモードを追加 翻訳依頼対応 ver1.9.2 ホーム画面翻訳 フォーマット選択時ヒントホバー カード裏面画像 ver 1.9.0 フィールド翻訳 ver 1.8.2 オーバーレイ簡素版への切り替えボタン 翻訳編集 ver.1.8.0 ANQセットカードの不具合修正 ツールバーアイコンの変更 Ver.1.7.2 及びランドマークカードが常に表示される対策として、ctrl+クリック画面にてホバーの非表示ボタン追加 ver.1.7.0 融合カードのオーバーレイ追加 ver.1.6.2 オーバーレイの表示デザインを微調整 翻訳済み: 4,775 / 4,775 件 ver1.6.0 カードをctrl+クリックにて、翻訳依頼出来るボタンを追加 翻訳の微修正 キーワード取得の強化 ver1.4.1 公式用語に沿って反映 altでの用語情報の充実 ver1.4.0 翻訳件数4647/4,647枚 トークン情報のオーバーレイ ver1.3.4 フルアート リアルタイムチャット翻訳 fab特有のシンボルマーク表示導入 【プライバシーと安全】 ※この拡張機能は storage(設定の保存)と、talishar.netへのアクセスしか行いません。「ユーザーの個人情報は収集しない」および「特定のウェブサイト(talishar.net)の表示を改善するためだけにデータを使用します」というポリシーを厳守しています。

Risk Assessment

Analyzed
62.87
out of 100
MEDIUM

140 security findings detected across all analyzers

Chrome extension requesting 6 permissions

Severity Breakdown

0
Critical
0
High
120
Medium
20
Low
0
Info

Finding Categories

2
Network
114
IoC Indicators

YARA Rules Matched

9 rules(20 hits)
postinstall system command LocalStorageShouldNotBeUsed postinstall file manipulation AlertStatementsShouldNotBeUsed postinstall network communication postinstall crypto operations postinstall environment access postinstall obfuscation postinstall file download

Requested Permissions

6 permissions
storage
Low
https://talishar.net/*
Low
https://images.talishar.net/*
Low
https://raw.githubusercontent.com/*
Low
https://storage.googleapis.com/*
Low
https://api.mymemory.translated.net/*
Low

About This Extension

導入後は拡張機能のアイコンをタップし、機能の確認をしてください 翻訳の調整、別カードのテキスト混入等は少しずつ対応していきます 拡張機能アイコンから、サポートをして貰えたら励みになります 更新情報 ver1.9.5 メニューにてヒントにビギナーとベーシックモードを追加 翻訳依頼対応 ver1.9.2 ホーム画面翻訳 フォーマット選択時ヒントホバー カード裏面画像 ver 1.9.0 フィールド翻訳  ver 1.8.2 オーバーレイ簡素版への切り替えボタン 翻訳編集 ver.1.8.0 ANQセットカードの不具合修正 ツールバーアイコンの変更 Ver.1.7.2  及びランドマークカードが常に表示される対策として、ctrl+クリック画面にてホバーの非表示ボタン追加 ver.1.7.0 融合カードのオーバーレイ追加  ver.1.6.2 オーバーレイの表示デザインを微調整 翻訳済み: 4,775 / 4,775 件 ver1.6.0 カードをctrl+クリックにて、翻訳依頼出来るボタンを追加     翻訳の微修正 キーワード取得の強化 ver1.4.1 公式用語に沿って反映 altでの用語情報の充実 ver1.4.0 翻訳件数4647/4,647枚 トークン情報のオーバーレイ ver1.3.4 フルアート リアルタイムチャット翻訳 fab特有のシンボルマーク表示導入 【プライバシーと安全】 ※この拡張機能は storage(設定の保存)と、talishar.netへのアクセスしか行いません。「ユーザーの個人情報は収集しない」および「特定のウェブサイト(talishar.net)の表示を改善するためだけにデータを使用します」というポリシーを厳守しています。

Detailed Findings

22 total

YARA Rule Matches

9 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
22
IP Addresses
23
Domains
75
Strings
114

All Indicators · 114

IP
detected IP: c::

XIOC detected IP: c::

extracted_from_files

Domain
detected Domain: numericstats.map

XIOC detected Domain: numericstats.map

extracted_from_files

Domain
detected Domain: meldoverlay.id

XIOC detected Domain: meldoverlay.id

extracted_from_files

IP
detected IP: 20::

XIOC detected IP: 20::

extracted_from_files

IP
detected IP: 06::6:b

XIOC detected IP: 06::6:b

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

URL
detected URL: https://images.talishar.net/public/cardimages/english/snatch_blue.webp');

XIOC detected URL: https://images.talishar.net/public/cardimages/english/snatch_blue.webp');

extracted_from_files

URL
detected URL: https://images.talishar.net/public/cardimages/english/command_and_conquer_red.webp');

XIOC detected URL: https://images.talishar.net/public/cardimages/english/command_and_conquer_red.webp');

extracted_from_files

URL
detected URL: https://images.talishar.net/public/cardimages/english/olympia.webp');

XIOC detected URL: https://images.talishar.net/public/cardimages/english/olympia.webp');

extracted_from_files

URL
detected URL: https://images.talishar.net/public/cardimages/english/sigil_of_suffering_red.webp

XIOC detected URL: https://images.talishar.net/public/cardimages/english/sigil_of_suffering_red.webp

extracted_from_files

URL
detected URL: https://buymeacoffee.com/chiitest

XIOC detected URL: https://buymeacoffee.com/chiitest

extracted_from_files

URL
detected URL: https://storage.googleapis.com/*

XIOC detected URL: https://storage.googleapis.com/*

extracted_from_files

URL
detected URL: https://api.mymemory.translated.net/*

XIOC detected URL: https://api.mymemory.translated.net/*

extracted_from_files

URL
detected URL: https://images.talishar.net/public/cardimages/english/command_and_conquer_red.webp

XIOC detected URL: https://images.talishar.net/public/cardimages/english/command_and_conquer_red.webp

extracted_from_files

URL
detected URL: https://images.talishar.net/public/cardimages/english/$

XIOC detected URL: https://images.talishar.net/public/cardimages/english/$

extracted_from_files

URL
detected URL: https://fonts.googleapis.com/css2?family=Inter:wght@400;700&display=swap');

XIOC detected URL: https://fonts.googleapis.com/css2?family=Inter:wght@400;700&display=swap');

extracted_from_files

URL
detected URL: https://images.talishar.net/public/cardimages/english/sink_below_red.webp');

XIOC detected URL: https://images.talishar.net/public/cardimages/english/sink_below_red.webp');

extracted_from_files

URL
detected URL: http://www.w3.org/2000/svg

XIOC detected URL: http://www.w3.org/2000/svg

extracted_from_files

URL
detected URL: http://cv.iptc.org/newscodes/digitalsourcetype/trainedAlgorithmicMedia

XIOC detected URL: http://cv.iptc.org/newscodes/digitalsourcetype/trainedAlgorithmicMedia

extracted_from_files

URL
detected URL: http://va.truepic.com/ejbca/publicweb/status/ocsp0

XIOC detected URL: http://va.truepic.com/ejbca/publicweb/status/ocsp0

extracted_from_files

URL
detected URL: https://clients2.google.com/service/update2/crx

XIOC detected URL: https://clients2.google.com/service/update2/crx

extracted_from_files

URL
detected URL: https://talishar.net/*

XIOC detected URL: https://talishar.net/*

extracted_from_files

URL
detected URL: https://images.talishar.net/*

XIOC detected URL: https://images.talishar.net/*

extracted_from_files

URL
detected URL: https://raw.githubusercontent.com/*

XIOC detected URL: https://raw.githubusercontent.com/*

extracted_from_files

URL
detected URL: https://docs.google.com/forms/d/e/1FAIpQLSfin2nFR6qqiLxWbVNst-HEC30blxopk0KM4rw8oT2mbvNYrw/formResponse';

XIOC detected URL: https://docs.google.com/forms/d/e/1FAIpQLSfin2nFR6qqiLxWbVNst-HEC30blxopk0KM4rw8oT2mbvNYrw/formResponse';

extracted_from_files

URL
detected URL: https://api.mymemory.translated.net/get?q=$

XIOC detected URL: https://api.mymemory.translated.net/get?q=$

extracted_from_files

IP
detected IP: f::

XIOC detected IP: f::

extracted_from_files

IP
detected IP: 3::

XIOC detected IP: 3::

extracted_from_files

Domain
detected Domain: pattern.search

XIOC detected Domain: pattern.search

extracted_from_files

Domain
detected Domain: f.read

XIOC detected Domain: f.read

extracted_from_files

Domain
detected Domain: cardvault.fabtcg.com

XIOC detected Domain: cardvault.fabtcg.com

extracted_from_files

Domain
detected Domain: re.search

XIOC detected Domain: re.search

extracted_from_files

Domain
detected Domain: match.group

XIOC detected Domain: match.group

extracted_from_files

Domain
detected Domain: paint.net

XIOC detected Domain: paint.net

extracted_from_files

Domain
detected Domain: c.uz

XIOC detected Domain: c.uz

extracted_from_files

Domain
detected Domain: fonts.googleapis.com

XIOC detected Domain: fonts.googleapis.com

extracted_from_files

Domain
detected Domain: btn.dataset.tab

XIOC detected Domain: btn.dataset.tab

extracted_from_files

Domain
detected Domain: chrome.storage

XIOC detected Domain: chrome.storage

extracted_from_files

Domain
detected Domain: panel.style.top

XIOC detected Domain: panel.style.top

extracted_from_files

Domain
detected Domain: buymeacoffee.com

XIOC detected Domain: buymeacoffee.com

extracted_from_files

Domain
detected Domain: window.open

XIOC detected Domain: window.open

extracted_from_files

Domain
detected Domain: glossary.md

XIOC detected Domain: glossary.md

extracted_from_files

Domain
detected Domain: vx.ls

XIOC detected Domain: vx.ls

extracted_from_files

Domain
detected Domain: t.ge

XIOC detected Domain: t.ge

extracted_from_files

Domain
detected Domain: h.tl

XIOC detected Domain: h.tl

extracted_from_files

Domain
detected Domain: m.vi

XIOC detected Domain: m.vi

extracted_from_files

Domain
detected Domain: clients2.google.com

XIOC detected Domain: clients2.google.com

extracted_from_files

Domain
detected Domain: raw.githubusercontent.com

XIOC detected Domain: raw.githubusercontent.com

extracted_from_files

Domain
detected Domain: storage.googleapis.com

XIOC detected Domain: storage.googleapis.com

extracted_from_files

Domain
detected Domain: a.am

XIOC detected Domain: a.am

extracted_from_files

Domain
detected Domain: w.gm

XIOC detected Domain: w.gm

extracted_from_files

Domain
detected Domain: www.w3.org

XIOC detected Domain: www.w3.org

extracted_from_files

Domain
detected Domain: ns.adobe.com

XIOC detected Domain: ns.adobe.com

extracted_from_files

IP
detected Domain: cv.iptc.org

XIOC detected Domain: cv.iptc.org

extracted_from_files

Domain
detected Domain: c2pa.hash.data

XIOC detected Domain: c2pa.hash.data

extracted_from_files

Domain
detected Domain: va.truepic.com

XIOC detected Domain: va.truepic.com

extracted_from_files

Domain
detected Domain: jy.mr

XIOC detected Domain: jy.mr

extracted_from_files

Domain
detected Domain: g.mw

XIOC detected Domain: g.mw

extracted_from_files

Domain
detected Domain: q.se

XIOC detected Domain: q.se

extracted_from_files

Domain
detected Domain: 륮.ml

XIOC detected Domain: 륮.ml

extracted_from_files

Domain
detected Domain: ƙs.gr

XIOC detected Domain: ƙs.gr

extracted_from_files

Domain
detected Domain: 2.af

XIOC detected Domain: 2.af

extracted_from_files

Domain
detected Domain: k.ng

XIOC detected Domain: k.ng

extracted_from_files

Domain
detected Domain: node.parentelement.id

XIOC detected Domain: node.parentelement.id

extracted_from_files

Domain
detected Domain: rect.top

XIOC detected Domain: rect.top

extracted_from_files

Domain
detected Domain: el.style

XIOC detected Domain: el.style

extracted_from_files

Domain
detected Domain: m.target

XIOC detected Domain: m.target

extracted_from_files

Domain
detected Domain: di.re

XIOC detected Domain: di.re

extracted_from_files

Domain
detected Domain: w.sh

XIOC detected Domain: w.sh

extracted_from_files

Domain
detected Domain: u.ir

XIOC detected Domain: u.ir

extracted_from_files

Domain
detected Domain: mutation.target

XIOC detected Domain: mutation.target

extracted_from_files

Domain
detected Domain: ta.select

XIOC detected Domain: ta.select

extracted_from_files

IP
detected Domain: formattipel.id

XIOC detected Domain: formattipel.id

extracted_from_files

IP
detected Domain: formattipel.style

XIOC detected Domain: formattipel.style

extracted_from_files

IP
detected Domain: formattipel.style.top

XIOC detected Domain: formattipel.style.top

extracted_from_files

Domain
detected Domain: root.id

XIOC detected Domain: root.id

extracted_from_files

Domain
detected Domain: nodefilter.show

XIOC detected Domain: nodefilter.show

extracted_from_files

Domain
detected Domain: tokenoverlaycontainer.id

XIOC detected Domain: tokenoverlaycontainer.id

extracted_from_files

Domain
detected Domain: foundtokens.map

XIOC detected Domain: foundtokens.map

extracted_from_files

Domain
detected Domain: token.data

XIOC detected Domain: token.data

extracted_from_files

Domain
detected Domain: token.name

XIOC detected Domain: token.name

extracted_from_files

Domain
detected Domain: mainrect.top

XIOC detected Domain: mainrect.top

extracted_from_files

Domain
detected Domain: container.style.top

XIOC detected Domain: container.style.top

extracted_from_files

Domain
detected Domain: e.target

XIOC detected Domain: e.target

extracted_from_files

Domain
detected Domain: mrect.top

XIOC detected Domain: mrect.top

extracted_from_files

URL
detected URL: http://ns.adobe.com/tiff/1.0/

XIOC detected URL: http://ns.adobe.com/tiff/1.0/

extracted_from_files

Domain
detected Domain: contentel.style.top

XIOC detected Domain: contentel.style.top

extracted_from_files

Domain
detected Domain: ui.style.top

XIOC detected Domain: ui.style.top

extracted_from_files

Domain
detected Domain: statsarr.map

XIOC detected Domain: statsarr.map

extracted_from_files

IP
detected IP: 4::

XIOC detected IP: 4::

extracted_from_files

Domain
detected Domain: meldoverlay.style.top

XIOC detected Domain: meldoverlay.style.top

extracted_from_files

Domain
detected Domain: api.mymemory.translated.net

XIOC detected Domain: api.mymemory.translated.net

extracted_from_files

Domain
detected Domain: termoverlay.id

XIOC detected Domain: termoverlay.id

extracted_from_files

Domain
detected Domain: res.id

XIOC detected Domain: res.id

extracted_from_files

Domain
detected Domain: overlay.id

XIOC detected Domain: overlay.id

extracted_from_files

Domain
detected Domain: el.id

XIOC detected Domain: el.id

extracted_from_files

Domain
detected Domain: c.id

XIOC detected Domain: c.id

extracted_from_files

Domain
detected Domain: tui.style.top

XIOC detected Domain: tui.style.top

extracted_from_files

IP
detected IP: ed::bef

XIOC detected IP: ed::bef

extracted_from_files

IP
detected IP: ::af

XIOC detected IP: ::af

extracted_from_files

Domain
detected Domain: toast.show

XIOC detected Domain: toast.show

extracted_from_files

Domain
detected Domain: talishar.net

XIOC detected Domain: talishar.net

extracted_from_files

Domain
detected Domain: tab.id

XIOC detected Domain: tab.id

extracted_from_files

Domain
detected Domain: images.talishar.net

XIOC detected Domain: images.talishar.net

extracted_from_files

Domain
detected Domain: docs.google.com

XIOC detected Domain: docs.google.com

extracted_from_files

IP
detected IP: 2::e

XIOC detected IP: 2::e

extracted_from_files

IP
detected IP: ::6

XIOC detected IP: ::6

extracted_from_files

IP
detected IP: 9::

XIOC detected IP: 9::

extracted_from_files

IP
detected IP: 2::

XIOC detected IP: 2::

extracted_from_files

IP
detected IP: e1::

XIOC detected IP: e1::

extracted_from_files

IP
detected IP: 6::

XIOC detected IP: 6::

extracted_from_files

IP
detected IP: 2::bef

XIOC detected IP: 2::bef

extracted_from_files

IP
detected IP: e::af

XIOC detected IP: e::af

extracted_from_files

URL
detected URL: http://www.w3.org/1999/02/22-rdf-syntax-ns#

XIOC detected URL: http://www.w3.org/1999/02/22-rdf-syntax-ns#

extracted_from_files

Security Analysis Summary

Security Analysis Overview

Talishar 日本語化+オーバーレイ表示 is a Chrome Web Store extension published by [email protected]. Version 1.9.6 has been analyzed by the Risky Plugins security platform, receiving a risk score of 62.87/100 (MEDIUM risk) based on 140 security findings.

Risk Assessment

This extension presents high security risk. Significant concerns were identified during analysis. It is not recommended for use in sensitive or production environments without thorough review.

Findings Breakdown

  • Medium: 120 finding(s)
  • Low: 20 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

Talishar 日本語化+オーバーレイ表示 is published by [email protected] on the Chrome Web Store marketplace. The extension has approximately 104 users.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions