Is "Font Identify" on Chrome Web Store Safe to Install?

[email protected] · chrome · v1.1.6

Font Identify — the fastest way to reveal any font online. Find out a website’s font name, size, weight, and style instantly — right in your browser. No coding, no setup, no confusion. 🔎 ⚡️ How it works Just highlight any text and get a neat popup with all the font details you need — name, size, and weight. Works on almost every site, from blogs to landing pages. 🧠 Why users love Font Identify • Instant font info in one click • 100% free and ad-free • Works on any website (including Google Fonts) • No account or permissions required • Sleek, minimal popup design 💼 Perfect for Designers 🎨 | Developers 💻 | Marketers 📊 | Bloggers ✍️ | SEO specialists 📈 🧩 What makes Font Identify different Unlike other tools, Font Identify gives real-time font recognition with zero distractions. No registration. No extra tabs. No guessing. Just highlight and discover. 🪄 Example questions it answers • What font is this? • What font is used for this header or logo? • Which Google Font is on this site? 🚀 Key features 1️⃣ Reveal font name, size, and weight instantly 2️⃣ Identify fonts on any website in real time 3️⃣ Spot typography trends effortlessly 4️⃣ Enjoy a clutter-free, modern interface 5️⃣ Get all of it for free — forever Font Identify is your all-in-one Chrome extension for fast and accurate font discovery. Install it now and enjoy the easiest way to explore web typography! 🌐 Changes by version: 1) 1.0.1 added the font-weight parameter 2) 1.1.0 fixed a bug in font-size detection 3) 1.1.1 added a floating window open button 4) 1.1.2 added options to enable and disable the floating button

Risk Assessment

Analyzed
75.97
out of 100
HIGH

125 security findings detected across all analyzers

Chrome extension requesting 4 permissions

Severity Breakdown

1
Critical
2
High
89
Medium
33
Low
0
Info

Finding Categories

3
Obfuscation
4
Network
85
IoC Indicators

YARA Rules Matched

11 rules(32 hits)
postinstall network communication postinstall system command postinstall file manipulation LocalStorageShouldNotBeUsed postinstall file download NoUseWeakRandom postinstall crypto operations postinstall obfuscation postinstall registry modification CreatingCookiesWithoutTheSecureFlag postinstall persistence mechanism

Requested Permissions

4 permissions
http://*/*
Dangerous
https://*/*
Dangerous
activeTab
Medium
scripting
Low

About This Extension

Font Identify — the fastest way to reveal any font online. Find out a website’s font name, size, weight, and style instantly — right in your browser. No coding, no setup, no confusion. 🔎 ⚡️ How it works Just highlight any text and get a neat popup with all the font details you need — name, size, and weight. Works on almost every site, from blogs to landing pages. 🧠 Why users love Font Identify • Instant font info in one click • 100% free and ad-free • Works on any website (including Google Fonts) • No account or permissions required • Sleek, minimal popup design 💼 Perfect for Designers 🎨 | Developers 💻 | Marketers 📊 | Bloggers ✍️ | SEO specialists 📈 🧩 What makes Font Identify different Unlike other tools, Font Identify gives real-time font recognition with zero distractions. No registration. No extra tabs. No guessing. Just highlight and discover. 🪄 Example questions it answers • What font is this? • What font is used for this header or logo? • Which Google Font is on this site? 🚀 Key features 1️⃣ Reveal font name, size, and weight instantly 2️⃣ Identify fonts on any website in real time 3️⃣ Spot typography trends effortlessly 4️⃣ Enjoy a clutter-free, modern interface 5️⃣ Get all of it for free — forever Font Identify is your all-in-one Chrome extension for fast and accurate font discovery. Install it now and enjoy the easiest way to explore web typography! 🌐 Changes by version: 1) 1.0.1 added the font-weight parameter 2) 1.1.0 fixed a bug in font-size detection 3) 1.1.1 added a floating window open button 4) 1.1.2 added options to enable and disable the floating button

Detailed Findings

40 total

YARA Rule Matches

11 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
17
IP Addresses
1
Domains
66
Strings
85

All Indicators · 85

URL
detected URL: https://gazinn.com/font-identify/?utm_source=extension

XIOC detected URL: https://gazinn.com/font-identify/?utm_source=extension

extracted_from_files

Domain
detected Domain: existingplugin.name

XIOC detected Domain: existingplugin.name

extracted_from_files

Domain
detected Domain: sender.tab

XIOC detected Domain: sender.tab

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

URL
detected URL: https://registry.npmjs.org/@amplitude/analytics-types/-/analytics-types-2.11.1.tgz

XIOC detected URL: https://registry.npmjs.org/@amplitude/analytics-types/-/analytics-types-2.11.1.tgz

extracted_from_files

URL
detected URL: https://registry.npmjs.org/@amplitude/plugin-page-view-tracking-browser/-/plugin-page-view-tracking-browser-2.6.12.tgz

XIOC detected URL: https://registry.npmjs.org/@amplitude/plugin-page-view-tracking-browser/-/plugin-page-view-tracking-browser-2.6.12.tgz

extracted_from_files

URL
detected URL: https://registry.npmjs.org/@types/zen-observable/-/zen-observable-0.8.3.tgz

XIOC detected URL: https://registry.npmjs.org/@types/zen-observable/-/zen-observable-0.8.3.tgz

extracted_from_files

URL
detected URL: https://registry.npmjs.org/tslib/-/tslib-2.8.1.tgz

XIOC detected URL: https://registry.npmjs.org/tslib/-/tslib-2.8.1.tgz

extracted_from_files

URL
detected URL: https://registry.npmjs.org/zen-observable/-/zen-observable-0.8.15.tgz

XIOC detected URL: https://registry.npmjs.org/zen-observable/-/zen-observable-0.8.15.tgz

extracted_from_files

URL
detected URL: https://registry.npmjs.org/zen-observable-ts/-/zen-observable-ts-1.1.0.tgz

XIOC detected URL: https://registry.npmjs.org/zen-observable-ts/-/zen-observable-ts-1.1.0.tgz

extracted_from_files

Hash
detected MD5 Hash: cf27af09d0a84ab86085953e7fdf2894

XIOC detected MD5 Hash: cf27af09d0a84ab86085953e7fdf2894

extracted_from_files

URL
detected URL: https://api.eu.amplitude.com/batch

XIOC detected URL: https://api.eu.amplitude.com/batch

extracted_from_files

URL
detected URL: https://www.docs.developers.amplitude.com/data/sdks/browser-2/#tracking-default-events

XIOC detected URL: https://www.docs.developers.amplitude.com/data/sdks/browser-2/#tracking-default-events

extracted_from_files

URL
detected URL: https://clients2.google.com/service/update2/crx

XIOC detected URL: https://clients2.google.com/service/update2/crx

extracted_from_files

URL
detected URL: https://registry.npmjs.org/@amplitude/analytics-browser/-/analytics-browser-2.8.0.tgz

XIOC detected URL: https://registry.npmjs.org/@amplitude/analytics-browser/-/analytics-browser-2.8.0.tgz

extracted_from_files

URL
detected URL: https://registry.npmjs.org/@amplitude/analytics-client-common/-/analytics-client-common-2.4.25.tgz

XIOC detected URL: https://registry.npmjs.org/@amplitude/analytics-client-common/-/analytics-client-common-2.4.25.tgz

extracted_from_files

URL
detected URL: https://registry.npmjs.org/@amplitude/analytics-connector/-/analytics-connector-1.6.4.tgz

XIOC detected URL: https://registry.npmjs.org/@amplitude/analytics-connector/-/analytics-connector-1.6.4.tgz

extracted_from_files

URL
detected URL: https://registry.npmjs.org/@amplitude/analytics-core/-/analytics-core-2.38.0.tgz

XIOC detected URL: https://registry.npmjs.org/@amplitude/analytics-core/-/analytics-core-2.38.0.tgz

extracted_from_files

Domain
detected Domain: chrome.runtime.id

XIOC detected Domain: chrome.runtime.id

extracted_from_files

Domain
detected Domain: registry.npmjs.org

XIOC detected Domain: registry.npmjs.org

extracted_from_files

Domain
detected Domain: popup.style.top

XIOC detected Domain: popup.style.top

extracted_from_files

Domain
detected Domain: t.id

XIOC detected Domain: t.id

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

URL
detected URL: https://api.eu.amplitude.com/2/httpapi

XIOC detected URL: https://api.eu.amplitude.com/2/httpapi

extracted_from_files

URL
detected URL: https://api2.amplitude.com/batch

XIOC detected URL: https://api2.amplitude.com/batch

extracted_from_files

Domain
detected Domain: navigator.online

XIOC detected Domain: navigator.online

extracted_from_files

Domain
detected Domain: init.call

XIOC detected Domain: init.call

extracted_from_files

Domain
detected Domain: super.prototype.identify.call

XIOC detected Domain: super.prototype.identify.call

extracted_from_files

Domain
detected Domain: super.prototype.groupidentify.call

XIOC detected Domain: super.prototype.groupidentify.call

extracted_from_files

Domain
detected Domain: super.prototype.revenue.call

XIOC detected Domain: super.prototype.revenue.call

extracted_from_files

Domain
detected Domain: super.prototype.process.call

XIOC detected Domain: super.prototype.process.call

extracted_from_files

Domain
detected Domain: clients2.google.com

XIOC detected Domain: clients2.google.com

extracted_from_files

Domain
detected Domain: super.call

XIOC detected Domain: super.call

extracted_from_files

Domain
detected Domain: super.prototype.set.call

XIOC detected Domain: super.prototype.set.call

extracted_from_files

Domain
detected Domain: xhr.open

XIOC detected Domain: xhr.open

extracted_from_files

Domain
detected Domain: c.secure

XIOC detected Domain: c.secure

extracted_from_files

Domain
detected Domain: form.id

XIOC detected Domain: form.id

extracted_from_files

Domain
detected Domain: form.name

XIOC detected Domain: form.name

extracted_from_files

Domain
detected Domain: a.id

XIOC detected Domain: a.id

extracted_from_files

Domain
detected Domain: d.next

XIOC detected Domain: d.next

extracted_from_files

Domain
detected Domain: k.next

XIOC detected Domain: k.next

extracted_from_files

Domain
detected Domain: a.search

XIOC detected Domain: a.search

extracted_from_files

Domain
detected Domain: responsejson.events

XIOC detected Domain: responsejson.events

extracted_from_files

Domain
detected Domain: this.storage

XIOC detected Domain: this.storage

extracted_from_files

Domain
detected Domain: this.options.secure

XIOC detected Domain: this.options.secure

extracted_from_files

Domain
detected Domain: a.name

XIOC detected Domain: a.name

extracted_from_files

Domain
detected Domain: specialeventtype.group

XIOC detected Domain: specialeventtype.group

extracted_from_files

Domain
detected Domain: this.name

XIOC detected Domain: this.name

extracted_from_files

Domain
detected Domain: this.properties

XIOC detected Domain: this.properties

extracted_from_files

Domain
detected Domain: b.next

XIOC detected Domain: b.next

extracted_from_files

Domain
detected Domain: unsent.map

XIOC detected Domain: unsent.map

extracted_from_files

Domain
detected Domain: this.queue.map

XIOC detected Domain: this.queue.map

extracted_from_files

Domain
detected Domain: list.map

XIOC detected Domain: list.map

extracted_from_files

Domain
detected Domain: plugin2.name

XIOC detected Domain: plugin2.name

extracted_from_files

Domain
detected Domain: plugins.map

XIOC detected Domain: plugins.map

extracted_from_files

Domain
detected Domain: c.call

XIOC detected Domain: c.call

extracted_from_files

Domain
detected Domain: d.call

XIOC detected Domain: d.call

extracted_from_files

Domain
detected Domain: destination.map

XIOC detected Domain: destination.map

extracted_from_files

Domain
detected Domain: queue.map

XIOC detected Domain: queue.map

extracted_from_files

Domain
detected Domain: a.next

XIOC detected Domain: a.next

extracted_from_files

Domain
detected Domain: i.next

XIOC detected Domain: i.next

extracted_from_files

Domain
detected Domain: array.prototype.slice.call

XIOC detected Domain: array.prototype.slice.call

extracted_from_files

Domain
detected Domain: 1.next

XIOC detected Domain: 1.next

extracted_from_files

Domain
detected Domain: a.call

XIOC detected Domain: a.call

extracted_from_files

URL
detected URL: https://api2.amplitude.com/2/httpapi

XIOC detected URL: https://api2.amplitude.com/2/httpapi

extracted_from_files

Domain
detected Domain: plugin.name

XIOC detected Domain: plugin.name

extracted_from_files

Domain
detected Domain: b.call

XIOC detected Domain: b.call

extracted_from_files

Domain
detected Domain: object.prototype.propertyisenumerable.call

XIOC detected Domain: object.prototype.propertyisenumerable.call

extracted_from_files

Domain
detected Domain: generator.next

XIOC detected Domain: generator.next

extracted_from_files

Domain
detected Domain: g.next

XIOC detected Domain: g.next

extracted_from_files

Domain
detected Domain: t.call

XIOC detected Domain: t.call

extracted_from_files

Domain
detected Domain: y.next

XIOC detected Domain: y.next

extracted_from_files

Domain
detected Domain: body.call

XIOC detected Domain: body.call

extracted_from_files

Domain
detected Domain: m.call

XIOC detected Domain: m.call

extracted_from_files

Domain
detected Domain: tab.id

XIOC detected Domain: tab.id

extracted_from_files

Domain
detected Domain: chrome.runtime.oninstalledreason.chrome

XIOC detected Domain: chrome.runtime.oninstalledreason.chrome

extracted_from_files

Domain
detected Domain: b.se

XIOC detected Domain: b.se

extracted_from_files

Domain
detected Domain: api2.amplitude.com

XIOC detected Domain: api2.amplitude.com

extracted_from_files

Domain
detected Domain: api.eu.amplitude.com

XIOC detected Domain: api.eu.amplitude.com

extracted_from_files

Domain
detected Domain: www.docs.developers.amplitude.com

XIOC detected Domain: www.docs.developers.amplitude.com

extracted_from_files

Domain
detected Domain: object.prototype.hasownproperty.call

XIOC detected Domain: object.prototype.hasownproperty.call

extracted_from_files

Domain
detected Domain: chrome.storage

XIOC detected Domain: chrome.storage

extracted_from_files

Domain
detected Domain: gazinn.com

XIOC detected Domain: gazinn.com

extracted_from_files

Domain
detected Domain: indexeddb.open

XIOC detected Domain: indexeddb.open

extracted_from_files

Domain
detected Domain: sender.tab.id

XIOC detected Domain: sender.tab.id

extracted_from_files

Security Analysis Summary

Security Analysis Overview

Font Identify is a Chrome Web Store extension published by [email protected]. Version 1.1.6 has been analyzed by the Risky Plugins security platform, receiving a risk score of 75.97/100 (HIGH risk) based on 125 security findings.

Risk Assessment

This extension presents high security risk. Significant concerns were identified during analysis. It is not recommended for use in sensitive or production environments without thorough review.

Findings Breakdown

  • Critical: 1 finding(s)
  • High: 2 finding(s)
  • Medium: 89 finding(s)
  • Low: 33 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

Font Identify is published by [email protected] on the Chrome Web Store marketplace. The extension has approximately 121 users.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions