Is "Chrome Key Event Tester" on Chrome Web Store Safe to Install?

[email protected] · chrome · v1.2

A simple app to help with debugging keyboard issues with Javascript and PNaCl. How to use: The left-hand-side shows a summary of the keyup, keydown and keypress JavaScript events, including which keys were held down simultaneously; the right-hand-side shows the equivalent PNaCl events. Hover over a key bubble for more details, or click "Debug log" to view a copy/pastable version for submitting bug reports. The source for this app can be found at https://code.google.com/p/chromium/codesearch#chromium/src/remoting/tools/javascript_key_tester/

Risk Assessment

Analyzed
34.84
out of 100
LOW

16 security findings detected across all analyzers

Severity Breakdown

0
Critical
8
High
8
Medium
0
Low
0
Info

Finding Categories

8
Malware Signatures
8
IoC Indicators

YARA Rules Matched

3 rules(8 hits)
postinstall file manipulation postinstall crypto operations postinstall system command

About This Extension

A simple app to help with debugging keyboard issues with Javascript and PNaCl. How to use: The left-hand-side shows a summary of the keyup, keydown and keypress JavaScript events, including which keys were held down simultaneously; the right-hand-side shows the equivalent PNaCl events. Hover over a key bubble for more details, or click "Debug log" to view a copy/pastable version for submitting bug reports. The source for this app can be found at https://code.google.com/p/chromium/codesearch#chromium/src/remoting/tools/javascript_key_tester/

Detailed Findings

8 total

YARA Rule Matches

3 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
1
IP Addresses
6
Domains
1
Strings
8

All Indicators · 8

IP
detected IP: ::bef

XIOC detected IP: ::bef

extracted_from_files

IP
detected IP: ed::bef

XIOC detected IP: ed::bef

extracted_from_files

IP
detected IP: ::af

XIOC detected IP: ::af

extracted_from_files

IP
detected IP: ed::af

XIOC detected IP: ed::af

extracted_from_files

IP
detected IP: d::bad

XIOC detected IP: d::bad

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

Domain
detected Domain: clients2.google.com

XIOC detected Domain: clients2.google.com

extracted_from_files

URL
detected URL: https://clients2.google.com/service/update2/crx

XIOC detected URL: https://clients2.google.com/service/update2/crx

extracted_from_files

Security Analysis Summary

Security Analysis Overview

Chrome Key Event Tester is a Chrome Web Store extension published by [email protected]. Version 1.2 has been analyzed by the Risky Plugins security platform, receiving a risk score of 34.84/100 (LOW risk) based on 16 security findings.

Risk Assessment

This extension presents low security risk. Some minor findings were detected, but nothing that would prevent typical usage. Reviewing the detailed findings below is recommended before use in sensitive environments.

Findings Breakdown

  • High: 8 finding(s)
  • Medium: 8 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

Chrome Key Event Tester is published by [email protected] on the Chrome Web Store marketplace. The extension has approximately 5K users.

Recommendation

Exercise caution with this extension. Review the detailed findings and ensure the requested permissions align with the extension's stated functionality before installation.

Frequently Asked Questions