Is "HoverTabOfLink" on Chrome Web Store Safe to Install?

[email protected] · chrome · v1.0.3

HoverTabOfLink 是一款浏览器链接预览工具,通过优雅的悬浮窗口体验,帮助用户在不离开当前页面的情况下快速预览链接内容,大幅提升网页浏览和信息获取效率。 ✨ 核心亮点 ✅ 智能悬浮预览:悬停或拖动链接即可实时预览网页内容,无需跳转新页面 ✅ 多触发方式支持:支持鼠标悬停、拖拽链接、快捷键等多种灵活触发方式 ✅ 高度个性化定制:提供丰富的布局选项,满足不同用户的视觉偏好 ✅ 响应式预览窗口:可自由调整大小的悬浮窗,完美适配各种屏幕尺寸 ✅ 侧边栏设置面板:通过直观的侧边栏界面进行便捷的个性化配置 ✅ 现代化技术架构:基于 WXT + React + TypeScript 构建,确保流畅稳定的使用体验 🎯 高效浏览新方式 只需将鼠标悬停在链接上,HoverTabOfLink 即刻在优雅的悬浮窗口中显示网页预览内容。无需反复开关标签页,让您保持专注,不打断阅读流程,享受真正无缝的网页浏览体验。 告别繁琐的页面跳转,用 HoverTabOfLink 重新定义您的网页浏览方式! 🚀

Risk Assessment

Analyzed
51.02
out of 100
MEDIUM

314 security findings detected across all analyzers

Severity Breakdown

0
Critical
24
High
290
Medium
0
Low
0
Info

Finding Categories

24
Malware
1
Network
266
IoC Indicators

YARA Rules Matched

9 rules(24 hits)
postinstall crypto operations postinstall system command postinstall persistence mechanism postinstall file download postinstall network communication postinstall file manipulation NoUseWeakRandom postinstall obfuscation postinstall environment access

About This Extension

HoverTabOfLink 是一款浏览器链接预览工具,通过优雅的悬浮窗口体验,帮助用户在不离开当前页面的情况下快速预览链接内容,大幅提升网页浏览和信息获取效率。 ✨ 核心亮点 ✅ 智能悬浮预览:悬停或拖动链接即可实时预览网页内容,无需跳转新页面 ✅ 多触发方式支持:支持鼠标悬停、拖拽链接、快捷键等多种灵活触发方式 ✅ 高度个性化定制:提供丰富的布局选项,满足不同用户的视觉偏好 ✅ 响应式预览窗口:可自由调整大小的悬浮窗,完美适配各种屏幕尺寸 ✅ 侧边栏设置面板:通过直观的侧边栏界面进行便捷的个性化配置 ✅ 现代化技术架构:基于 WXT + React + TypeScript 构建,确保流畅稳定的使用体验 🎯 高效浏览新方式 只需将鼠标悬停在链接上,HoverTabOfLink 即刻在优雅的悬浮窗口中显示网页预览内容。无需反复开关标签页,让您保持专注,不打断阅读流程,享受真正无缝的网页浏览体验。 告别繁琐的页面跳转,用 HoverTabOfLink 重新定义您的网页浏览方式! 🚀

Detailed Findings

25 total

YARA Rule Matches

9 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
8
IP Addresses
11
Domains
248
Strings
266

All Indicators · 266

Domain
detected Domain: array.prototype.foreach.call

XIOC detected Domain: array.prototype.foreach.call

extracted_from_files

Domain
detected Domain: o.call

XIOC detected Domain: o.call

extracted_from_files

Domain
detected Domain: e.call

XIOC detected Domain: e.call

extracted_from_files

URL
detected URL: https://www.google.com/search?q=$

XIOC detected URL: https://www.google.com/search?q=$

extracted_from_files

URL
detected URL: http://

XIOC detected URL: http://

extracted_from_files

URL
detected URL: https://clients2.google.com/service/update2/crx

XIOC detected URL: https://clients2.google.com/service/update2/crx

extracted_from_files

URL
detected URL: https://react.dev/errors/

XIOC detected URL: https://react.dev/errors/

extracted_from_files

URL
detected URL: http://www.w3.org/2000/svg

XIOC detected URL: http://www.w3.org/2000/svg

extracted_from_files

URL
detected URL: http://www.w3.org/1998/Math/MathML

XIOC detected URL: http://www.w3.org/1998/Math/MathML

extracted_from_files

URL
detected URL: http://www.w3.org/1999/xlink

XIOC detected URL: http://www.w3.org/1999/xlink

extracted_from_files

URL
detected URL: https://tailwindcss.com

XIOC detected URL: https://tailwindcss.com

extracted_from_files

IP
detected IP: 1.5.75.75

XIOC detected IP: 1.5.75.75

extracted_from_files

IP
detected IP: d::f

XIOC detected IP: d::f

extracted_from_files

IP
detected IP: 0::f

XIOC detected IP: 0::f

extracted_from_files

IP
detected IP: 7::f

XIOC detected IP: 7::f

extracted_from_files

IP
detected IP: d::

XIOC detected IP: d::

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

IP
detected IP: ::f

XIOC detected IP: ::f

extracted_from_files

Domain
detected Domain: n.call

XIOC detected Domain: n.call

extracted_from_files

Domain
detected Domain: object.prototype.hasownproperty.call

XIOC detected Domain: object.prototype.hasownproperty.call

extracted_from_files

Domain
detected Domain: globalthis.chrome

XIOC detected Domain: globalthis.chrome

extracted_from_files

Domain
detected Domain: www.w3.org

XIOC detected Domain: www.w3.org

extracted_from_files

Domain
detected Domain: react.dev

XIOC detected Domain: react.dev

extracted_from_files

IP
detected IP: ::af

XIOC detected IP: ::af

extracted_from_files

IP
detected IP: ::bef

XIOC detected IP: ::bef

extracted_from_files

Domain
detected Domain: window.open

XIOC detected Domain: window.open

extracted_from_files

Domain
detected Domain: t.map

XIOC detected Domain: t.map

extracted_from_files

Domain
detected Domain: t.media

XIOC detected Domain: t.media

extracted_from_files

Domain
detected Domain: t.as

XIOC detected Domain: t.as

extracted_from_files

Domain
detected Domain: x.call

XIOC detected Domain: x.call

extracted_from_files

Domain
detected Domain: r.call

XIOC detected Domain: r.call

extracted_from_files

Domain
detected Domain: e.next

XIOC detected Domain: e.next

extracted_from_files

Domain
detected Domain: e.runtime.id

XIOC detected Domain: e.runtime.id

extracted_from_files

Domain
detected Domain: tailwindcss.com

XIOC detected Domain: tailwindcss.com

extracted_from_files

Domain
detected Domain: g.target

XIOC detected Domain: g.target

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: z.top

XIOC detected Domain: z.top

extracted_from_files

Domain
detected Domain: r.top

XIOC detected Domain: r.top

extracted_from_files

Domain
detected Domain: e.current.style.top

XIOC detected Domain: e.current.style.top

extracted_from_files

Domain
detected Domain: performance.now

XIOC detected Domain: performance.now

extracted_from_files

Domain
detected Domain: n.id-g.id

XIOC detected Domain: n.id-g.id

extracted_from_files

Domain
detected Domain: k.call

XIOC detected Domain: k.call

extracted_from_files

Domain
detected Domain: c.next

XIOC detected Domain: c.next

extracted_from_files

Domain
detected Domain: ne.call

XIOC detected Domain: ne.call

extracted_from_files

Domain
detected Domain: e.sidepanel.open

XIOC detected Domain: e.sidepanel.open

extracted_from_files

Domain
detected Domain: n.id

XIOC detected Domain: n.id

extracted_from_files

Domain
detected Domain: i.call

XIOC detected Domain: i.call

extracted_from_files

Domain
detected Domain: t.name

XIOC detected Domain: t.name

extracted_from_files

Domain
detected Domain: e.name

XIOC detected Domain: e.name

extracted_from_files

Domain
detected Domain: h.media

XIOC detected Domain: h.media

extracted_from_files

Domain
detected Domain: h.as

XIOC detected Domain: h.as

extracted_from_files

Domain
detected Domain: f.now

XIOC detected Domain: f.now

extracted_from_files

Domain
detected Domain: d.now

XIOC detected Domain: d.now

extracted_from_files

Domain
detected Domain: o.name

XIOC detected Domain: o.name

extracted_from_files

Domain
detected Domain: n.name

XIOC detected Domain: n.name

extracted_from_files

Domain
detected Domain: e.target

XIOC detected Domain: e.target

extracted_from_files

Domain
detected Domain: e.style

XIOC detected Domain: e.style

extracted_from_files

Domain
detected Domain: d.map

XIOC detected Domain: d.map

extracted_from_files

Domain
detected Domain: m.top

XIOC detected Domain: m.top

extracted_from_files

Domain
detected Domain: v.next

XIOC detected Domain: v.next

extracted_from_files

Domain
detected Domain: o.next

XIOC detected Domain: o.next

extracted_from_files

Domain
detected Domain: t.target

XIOC detected Domain: t.target

extracted_from_files

Domain
detected Domain: object.is

XIOC detected Domain: object.is

extracted_from_files

Domain
detected Domain: t.data

XIOC detected Domain: t.data

extracted_from_files

Domain
detected Domain: e.data

XIOC detected Domain: e.data

extracted_from_files

Domain
detected Domain: this.target

XIOC detected Domain: this.target

extracted_from_files

Domain
detected Domain: ye.call

XIOC detected Domain: ye.call

extracted_from_files

Domain
detected Domain: a.next

XIOC detected Domain: a.next

extracted_from_files

Domain
detected Domain: n.next

XIOC detected Domain: n.next

extracted_from_files

Domain
detected Domain: t.next

XIOC detected Domain: t.next

extracted_from_files

Domain
detected Domain: nn.next

XIOC detected Domain: nn.next

extracted_from_files

Domain
detected Domain: x.next

XIOC detected Domain: x.next

extracted_from_files

Domain
detected Domain: a.name

XIOC detected Domain: a.name

extracted_from_files

Domain
detected Domain: o.data

XIOC detected Domain: o.data

extracted_from_files

Domain
detected Domain: j.next

XIOC detected Domain: j.next

extracted_from_files

Domain
detected Domain: a.data.map

XIOC detected Domain: a.data.map

extracted_from_files

Domain
detected Domain: nt.next

XIOC detected Domain: nt.next

extracted_from_files

Domain
detected Domain: c.events

XIOC detected Domain: c.events

extracted_from_files

Domain
detected Domain: pe.next

XIOC detected Domain: pe.next

extracted_from_files

Domain
detected Domain: u.next

XIOC detected Domain: u.next

extracted_from_files

Domain
detected Domain: e.id

XIOC detected Domain: e.id

extracted_from_files

Domain
detected Domain: x.data

XIOC detected Domain: x.data

extracted_from_files

Domain
detected Domain: n.compare

XIOC detected Domain: n.compare

extracted_from_files

Domain
detected Domain: n.data

XIOC detected Domain: n.data

extracted_from_files

Domain
detected Domain: ce.call

XIOC detected Domain: ce.call

extracted_from_files

Domain
detected Domain: k.next

XIOC detected Domain: k.next

extracted_from_files

Domain
detected Domain: object.prototype.tostring.call

XIOC detected Domain: object.prototype.tostring.call

extracted_from_files

Domain
detected Domain: b.target

XIOC detected Domain: b.target

extracted_from_files

Domain
detected Domain: jl.next

XIOC detected Domain: jl.next

extracted_from_files

Domain
detected Domain: c.id

XIOC detected Domain: c.id

extracted_from_files

Domain
detected Domain: a.memoizedprops.style

XIOC detected Domain: a.memoizedprops.style

extracted_from_files

Domain
detected Domain: c.style

XIOC detected Domain: c.style

extracted_from_files

Domain
detected Domain: n.property

XIOC detected Domain: n.property

extracted_from_files

Domain
detected Domain: a.is

XIOC detected Domain: a.is

extracted_from_files

Domain
detected Domain: yr.call

XIOC detected Domain: yr.call

extracted_from_files

Domain
detected Domain: n.media

XIOC detected Domain: n.media

extracted_from_files

Domain
detected Domain: c.data

XIOC detected Domain: c.data

extracted_from_files

Domain
detected Domain: o.target

XIOC detected Domain: o.target

extracted_from_files

Domain
detected Domain: ce.data

XIOC detected Domain: ce.data

extracted_from_files

Domain
detected Domain: ve.data

XIOC detected Domain: ve.data

extracted_from_files

Domain
detected Domain: ge.target

XIOC detected Domain: ge.target

extracted_from_files

Domain
detected Domain: te.clienty-z.current.top

XIOC detected Domain: te.clienty-z.current.top

extracted_from_files

Domain
detected Domain: l.style

XIOC detected Domain: l.style

extracted_from_files

Domain
detected Domain: r.map

XIOC detected Domain: r.map

extracted_from_files

Domain
detected Domain: l.ordersensitivemodifiers.map

XIOC detected Domain: l.ordersensitivemodifiers.map

extracted_from_files

Domain
detected Domain: p.map

XIOC detected Domain: p.map

extracted_from_files

Domain
detected Domain: l.map

XIOC detected Domain: l.map

extracted_from_files

Domain
detected Domain: this.next

XIOC detected Domain: this.next

extracted_from_files

Domain
detected Domain: q.target

XIOC detected Domain: q.target

extracted_from_files

Domain
detected Domain: u.style

XIOC detected Domain: u.style

extracted_from_files

Domain
detected Domain: d.top

XIOC detected Domain: d.top

extracted_from_files

Domain
detected Domain: g.clienty-e.top

XIOC detected Domain: g.clienty-e.top

extracted_from_files

Domain
detected Domain: te.target

XIOC detected Domain: te.target

extracted_from_files

Domain
detected Domain: w.style

XIOC detected Domain: w.style

extracted_from_files

Domain
detected Domain: re.target

XIOC detected Domain: re.target

extracted_from_files

Domain
detected Domain: object.prototype.propertyisenumerable.call

XIOC detected Domain: object.prototype.propertyisenumerable.call

extracted_from_files

Domain
detected Domain: l.select

XIOC detected Domain: l.select

extracted_from_files

Domain
detected Domain: nodefilter.show

XIOC detected Domain: nodefilter.show

extracted_from_files

Domain
detected Domain: l.target

XIOC detected Domain: l.target

extracted_from_files

Domain
detected Domain: r.originalevent.target

XIOC detected Domain: r.originalevent.target

extracted_from_files

Domain
detected Domain: d.target

XIOC detected Domain: d.target

extracted_from_files

Domain
detected Domain: p.target

XIOC detected Domain: p.target

extracted_from_files

Domain
detected Domain: r.target

XIOC detected Domain: r.target

extracted_from_files

Domain
detected Domain: s.host

XIOC detected Domain: s.host

extracted_from_files

Domain
detected Domain: l.gap

XIOC detected Domain: l.gap

extracted_from_files

Domain
detected Domain: l.top

XIOC detected Domain: l.top

extracted_from_files

Domain
detected Domain: l.as

XIOC detected Domain: l.as

extracted_from_files

Domain
detected Domain: i.read

XIOC detected Domain: i.read

extracted_from_files

Domain
detected Domain: array.prototype.slice.call

XIOC detected Domain: array.prototype.slice.call

extracted_from_files

Domain
detected Domain: z.top-v.top

XIOC detected Domain: z.top-v.top

extracted_from_files

Domain
detected Domain: i.map

XIOC detected Domain: i.map

extracted_from_files

Domain
detected Domain: l.host

XIOC detected Domain: l.host

extracted_from_files

Domain
detected Domain: v.delta

XIOC detected Domain: v.delta

extracted_from_files

Domain
detected Domain: v.target

XIOC detected Domain: v.target

extracted_from_files

Domain
detected Domain: v.name

XIOC detected Domain: v.name

extracted_from_files

Domain
detected Domain: d.host

XIOC detected Domain: d.host

extracted_from_files

Domain
detected Domain: h.top

XIOC detected Domain: h.top

extracted_from_files

Domain
detected Domain: u.top

XIOC detected Domain: u.top

extracted_from_files

Domain
detected Domain: i.host

XIOC detected Domain: i.host

extracted_from_files

Domain
detected Domain: b.top

XIOC detected Domain: b.top

extracted_from_files

IP
detected IP: ::bac

XIOC detected IP: ::bac

extracted_from_files

Domain
detected Domain: f.open

XIOC detected Domain: f.open

extracted_from_files

Domain
detected Domain: t.style

XIOC detected Domain: t.style

extracted_from_files

Domain
detected Domain: j.floating.style

XIOC detected Domain: j.floating.style

extracted_from_files

Domain
detected Domain: hasownproperty.call

XIOC detected Domain: hasownproperty.call

extracted_from_files

Domain
detected Domain: f.top

XIOC detected Domain: f.top

extracted_from_files

Domain
detected Domain: m.bottom-m.top

XIOC detected Domain: m.bottom-m.top

extracted_from_files

Domain
detected Domain: g.top

XIOC detected Domain: g.top

extracted_from_files

Domain
detected Domain: d.style

XIOC detected Domain: d.style

extracted_from_files

Domain
detected Domain: p.style.top

XIOC detected Domain: p.style.top

extracted_from_files

Domain
detected Domain: q.top

XIOC detected Domain: q.top

extracted_from_files

Domain
detected Domain: j.target

XIOC detected Domain: j.target

extracted_from_files

Domain
detected Domain: z.style

XIOC detected Domain: z.style

extracted_from_files

Domain
detected Domain: d.open

XIOC detected Domain: d.open

extracted_from_files

Domain
detected Domain: r.open

XIOC detected Domain: r.open

extracted_from_files

Domain
detected Domain: h.style

XIOC detected Domain: h.style

extracted_from_files

Domain
detected Domain: t-r.top

XIOC detected Domain: t-r.top

extracted_from_files

Domain
detected Domain: b.style

XIOC detected Domain: b.style

extracted_from_files

Domain
detected Domain: r.style

XIOC detected Domain: r.style

extracted_from_files

Domain
detected Domain: se.select

XIOC detected Domain: se.select

extracted_from_files

Domain
detected Domain: b.call

XIOC detected Domain: b.call

extracted_from_files

Domain
detected Domain: u.id

XIOC detected Domain: u.id

extracted_from_files

Domain
detected Domain: i.top

XIOC detected Domain: i.top

extracted_from_files

Domain
detected Domain: p.style

XIOC detected Domain: p.style

extracted_from_files

Domain
detected Domain: w.target

XIOC detected Domain: w.target

extracted_from_files

Domain
detected Domain: u.open

XIOC detected Domain: u.open

extracted_from_files

IP
detected Domain: tooltip.open

XIOC detected Domain: tooltip.open

extracted_from_files

Domain
detected Domain: f.name

XIOC detected Domain: f.name

extracted_from_files

Domain
detected Domain: u.values.map

XIOC detected Domain: u.values.map

extracted_from_files

Domain
detected Domain: qa.map

XIOC detected Domain: qa.map

extracted_from_files

Domain
detected Domain: s.map

XIOC detected Domain: s.map

extracted_from_files

Domain
detected Domain: f.map

XIOC detected Domain: f.map

extracted_from_files

Domain
detected Domain: t.storage

XIOC detected Domain: t.storage

extracted_from_files

Domain
detected Domain: www.example.com

XIOC detected Domain: www.example.com

extracted_from_files

Domain
detected Domain: www.google.com

XIOC detected Domain: www.google.com

extracted_from_files

Domain
detected Domain: example.com

XIOC detected Domain: example.com

extracted_from_files

Domain
detected Domain: nt.info

XIOC detected Domain: nt.info

extracted_from_files

Domain
detected Domain: r.finally.call

XIOC detected Domain: r.finally.call

extracted_from_files

Domain
detected Domain: this.info

XIOC detected Domain: this.info

extracted_from_files

Domain
detected Domain: r.id

XIOC detected Domain: r.id

extracted_from_files

Domain
detected Domain: this.toasts.map

XIOC detected Domain: this.toasts.map

extracted_from_files

Domain
detected Domain: m.id

XIOC detected Domain: m.id

extracted_from_files

Domain
detected Domain: i.id

XIOC detected Domain: i.id

extracted_from_files

Domain
detected Domain: g.action.onclick.call

XIOC detected Domain: g.action.onclick.call

extracted_from_files

Domain
detected Domain: g.cancel.onclick.call

XIOC detected Domain: g.cancel.onclick.call

extracted_from_files

Domain
detected Domain: g.style

XIOC detected Domain: g.style

extracted_from_files

Domain
detected Domain: g.ondismiss.call

XIOC detected Domain: g.ondismiss.call

extracted_from_files

Domain
detected Domain: g.onautoclose.call

XIOC detected Domain: g.onautoclose.call

extracted_from_files

Domain
detected Domain: ht.map

XIOC detected Domain: ht.map

extracted_from_files

Domain
detected Domain: g.id

XIOC detected Domain: g.id

extracted_from_files

Domain
detected Domain: ne.id

XIOC detected Domain: ne.id

extracted_from_files

Domain
detected Domain: ne.target

XIOC detected Domain: ne.target

extracted_from_files

Domain
detected Domain: te.map

XIOC detected Domain: te.map

extracted_from_files

Domain
detected Domain: oe.id

XIOC detected Domain: oe.id

extracted_from_files

Domain
detected Domain: w.map

XIOC detected Domain: w.map

extracted_from_files

Domain
detected Domain: y.id

XIOC detected Domain: y.id

extracted_from_files

Domain
detected Domain: le.id

XIOC detected Domain: le.id

extracted_from_files

Domain
detected Domain: l.dragtext.searchengines.baidu

XIOC detected Domain: l.dragtext.searchengines.baidu

extracted_from_files

Domain
detected Domain: l.dragtext.searchengines.google

XIOC detected Domain: l.dragtext.searchengines.google

extracted_from_files

Domain
detected Domain: l.dragtext.searchengines.bing

XIOC detected Domain: l.dragtext.searchengines.bing

extracted_from_files

Domain
detected Domain: l.linkpreview.popuppositions.center

XIOC detected Domain: l.linkpreview.popuppositions.center

extracted_from_files

Domain
detected Domain: r.next

XIOC detected Domain: r.next

extracted_from_files

Domain
detected Domain: ht.call

XIOC detected Domain: ht.call

extracted_from_files

Domain
detected Domain: l.other.languages.ar

XIOC detected Domain: l.other.languages.ar

extracted_from_files

Domain
detected Domain: l.other.languages.pt

XIOC detected Domain: l.other.languages.pt

extracted_from_files

Domain
detected Domain: l.other.languages.es

XIOC detected Domain: l.other.languages.es

extracted_from_files

Domain
detected Domain: l.other.languages.it

XIOC detected Domain: l.other.languages.it

extracted_from_files

Domain
detected Domain: l.other.languages.ru

XIOC detected Domain: l.other.languages.ru

extracted_from_files

Domain
detected Domain: s.media

XIOC detected Domain: s.media

extracted_from_files

Domain
detected Domain: s.as

XIOC detected Domain: s.as

extracted_from_files

Domain
detected Domain: rt.now

XIOC detected Domain: rt.now

extracted_from_files

Domain
detected Domain: z.now

XIOC detected Domain: z.now

extracted_from_files

Domain
detected Domain: g.id-r.id

XIOC detected Domain: g.id-r.id

extracted_from_files

Domain
detected Domain: yt.call

XIOC detected Domain: yt.call

extracted_from_files

Domain
detected Domain: m.call

XIOC detected Domain: m.call

extracted_from_files

Domain
detected Domain: l.data

XIOC detected Domain: l.data

extracted_from_files

Domain
detected Domain: u.name

XIOC detected Domain: u.name

extracted_from_files

Domain
detected Domain: u.call

XIOC detected Domain: u.call

extracted_from_files

Domain
detected Domain: t.call

XIOC detected Domain: t.call

extracted_from_files

Domain
detected Domain: p.call

XIOC detected Domain: p.call

extracted_from_files

Domain
detected Domain: xl.call

XIOC detected Domain: xl.call

extracted_from_files

Domain
detected Domain: l.name

XIOC detected Domain: l.name

extracted_from_files

Domain
detected Domain: n.events

XIOC detected Domain: n.events

extracted_from_files

Domain
detected Domain: zt.next

XIOC detected Domain: zt.next

extracted_from_files

Domain
detected Domain: y.next

XIOC detected Domain: y.next

extracted_from_files

Domain
detected Domain: f.next

XIOC detected Domain: f.next

extracted_from_files

Domain
detected Domain: l.next

XIOC detected Domain: l.next

extracted_from_files

Domain
detected Domain: te.next

XIOC detected Domain: te.next

extracted_from_files

Domain
detected Domain: i.next

XIOC detected Domain: i.next

extracted_from_files

Domain
detected Domain: n.style

XIOC detected Domain: n.style

extracted_from_files

Domain
detected Domain: e.property

XIOC detected Domain: e.property

extracted_from_files

Domain
detected Domain: t.id

XIOC detected Domain: t.id

extracted_from_files

Domain
detected Domain: e.compare

XIOC detected Domain: e.compare

extracted_from_files

Domain
detected Domain: h.next

XIOC detected Domain: h.next

extracted_from_files

Domain
detected Domain: u.data

XIOC detected Domain: u.data

extracted_from_files

Domain
detected Domain: gt.next

XIOC detected Domain: gt.next

extracted_from_files

Domain
detected Domain: u.target

XIOC detected Domain: u.target

extracted_from_files

Domain
detected Domain: it.data

XIOC detected Domain: it.data

extracted_from_files

Domain
detected Domain: v.data

XIOC detected Domain: v.data

extracted_from_files

Domain
detected Domain: m.target

XIOC detected Domain: m.target

extracted_from_files

Domain
detected Domain: ca.next

XIOC detected Domain: ca.next

extracted_from_files

Domain
detected Domain: t.top

XIOC detected Domain: t.top

extracted_from_files

Domain
detected Domain: f.memoizedprops.style

XIOC detected Domain: f.memoizedprops.style

extracted_from_files

Domain
detected Domain: www.baidu.com

XIOC detected Domain: www.baidu.com

extracted_from_files

Domain
detected Domain: globalthis.events

XIOC detected Domain: globalthis.events

extracted_from_files

Domain
detected Domain: at.top

XIOC detected Domain: at.top

extracted_from_files

Domain
detected Domain: k.current.style.top

XIOC detected Domain: k.current.style.top

extracted_from_files

Domain
detected Domain: rt.map

XIOC detected Domain: rt.map

extracted_from_files

Domain
detected Domain: kn.call

XIOC detected Domain: kn.call

extracted_from_files

Domain
detected Domain: e.media

XIOC detected Domain: e.media

extracted_from_files

Domain
detected Domain: perplexity.ai

XIOC detected Domain: perplexity.ai

extracted_from_files

Domain
detected Domain: baidu.com

XIOC detected Domain: baidu.com

extracted_from_files

Domain
detected Domain: z.target

XIOC detected Domain: z.target

extracted_from_files

Domain
detected Domain: q.id

XIOC detected Domain: q.id

extracted_from_files

Domain
detected Domain: www.bing.com

XIOC detected Domain: www.bing.com

extracted_from_files

Domain
detected Domain: www.perplexity.ai

XIOC detected Domain: www.perplexity.ai

extracted_from_files

Domain
detected Domain: duckduckgo.com

XIOC detected Domain: duckduckgo.com

extracted_from_files

Domain
detected Domain: clients2.google.com

XIOC detected Domain: clients2.google.com

extracted_from_files

Domain
detected Domain: this.locationwatcher.run

XIOC detected Domain: this.locationwatcher.run

extracted_from_files

Domain
detected Domain: cl.runtime.id

XIOC detected Domain: cl.runtime.id

extracted_from_files

Domain
detected Domain: window.top

XIOC detected Domain: window.top

extracted_from_files

Domain
detected Domain: google.com

XIOC detected Domain: google.com

extracted_from_files

Domain
detected Domain: l.other.languages.de

XIOC detected Domain: l.other.languages.de

extracted_from_files

Domain
detected Domain: l.other.languages.fr

XIOC detected Domain: l.other.languages.fr

extracted_from_files

Domain
detected Domain: c.call

XIOC detected Domain: c.call

extracted_from_files

Domain
detected Domain: m.map

XIOC detected Domain: m.map

extracted_from_files

Security Analysis Summary

Security Analysis Overview

HoverTabOfLink is a Chrome Web Store extension published by [email protected]. Version 1.0.3 has been analyzed by the Risky Plugins security platform, receiving a risk score of 51.02/100 (MEDIUM risk) based on 314 security findings.

Risk Assessment

This extension presents moderate security risk. Several findings were detected that may warrant attention. Users should carefully review the permissions and findings before installation.

Findings Breakdown

  • High: 24 finding(s)
  • Medium: 290 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

HoverTabOfLink is published by [email protected] on the Chrome Web Store marketplace. The extension has approximately 61 users.

Recommendation

Exercise caution with this extension. Review the detailed findings and ensure the requested permissions align with the extension's stated functionality before installation.

Frequently Asked Questions