Is "Timestamps for YouTube" on Firefox Add-ons Safe to Install?

weaving · firefox · v0.1.0

Organize your YouTube video timestamps. Save a timecode Give it a name Get a shareable URL instantly Look up your saved timestamps whenever you want and skip to your favorite moments. Alt+T command lets you open the add-on even in fullscreen mode. Timestamps for YouTube is especially useful for streamers, content creators, and video editors. This add-on does not collect any data. Everything is stored locally in your browser.

Risk Assessment

Analyzed
84.98
out of 100
HIGH

121 security findings detected across all analyzers

Firefox extension requesting 3 permissions

Severity Breakdown

0
Critical
23
High
98
Medium
0
Low
0
Info

Finding Categories

22
Malware Signatures
1
Obfuscation
3
Network
94
IoC Indicators

YARA Rules Matched

8 rules(22 hits)
postinstall network communication postinstall system command postinstall persistence mechanism postinstall file manipulation postinstall obfuscation postinstall file download NoUseWeakRandom postinstall crypto operations

Requested Permissions

3 permissions
storage
Low
unlimitedStorage
Low
*://www.youtube.com/*
Low

About This Extension

Organize your YouTube video timestamps. <ul><li>Save a timecode</li><li>Give it a name</li><li>Get a shareable URL instantly</li></ul> Look up your saved timestamps whenever you want and skip to your favorite moments. Alt+T command lets you open the add-on even in fullscreen mode. Timestamps for YouTube is especially useful for streamers, content creators, and video editors. This add-on does not collect any data. Everything is stored locally in your browser.

Detailed Findings

26 total

YARA Rule Matches

8 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
19
IP Addresses
2
Domains
74
Strings
94

All Indicators · 94

Domain
detected Domain: t.style.top

XIOC detected Domain: t.style.top

extracted_from_files

URL
detected URL: https://www.patreon.com/cw/weaving

XIOC detected URL: https://www.patreon.com/cw/weaving

extracted_from_files

Hash
detected MD5 Hash: 1a4d24e291848323b644bdeab69f030e

XIOC detected MD5 Hash: 1a4d24e291848323b644bdeab69f030e

extracted_from_files

URL
detected URL: https://svelte.dev/e/state_unsafe_mutation

XIOC detected URL: https://svelte.dev/e/state_unsafe_mutation

extracted_from_files

URL
detected URL: https://svelte.dev/e/svelte_boundary_reset_onerror

XIOC detected URL: https://svelte.dev/e/svelte_boundary_reset_onerror

extracted_from_files

URL
detected URL: https://svelte.dev/e/hydration_mismatch

XIOC detected URL: https://svelte.dev/e/hydration_mismatch

extracted_from_files

URL
detected URL: https://svelte.dev/e/select_multiple_invalid_value

XIOC detected URL: https://svelte.dev/e/select_multiple_invalid_value

extracted_from_files

URL
detected URL: https://svelte.dev/e/svelte_boundary_reset_noop

XIOC detected URL: https://svelte.dev/e/svelte_boundary_reset_noop

extracted_from_files

URL
detected URL: https://developer.mozilla.org/en-US/docs/Web/API/Element/attachShadow#elements_you_can_attach_a_shadow_to

XIOC detected URL: https://developer.mozilla.org/en-US/docs/Web/API/Element/attachShadow#elements_you_can_attach_a_shadow_to

extracted_from_files

URL
detected URL: https://svelte.dev/e/effect_in_teardown

XIOC detected URL: https://svelte.dev/e/effect_in_teardown

extracted_from_files

URL
detected URL: https://svelte.dev/e/effect_in_unowned_derived

XIOC detected URL: https://svelte.dev/e/effect_in_unowned_derived

extracted_from_files

URL
detected URL: https://svelte.dev/e/effect_orphan

XIOC detected URL: https://svelte.dev/e/effect_orphan

extracted_from_files

URL
detected URL: https://svelte.dev/e/effect_update_depth_exceeded

XIOC detected URL: https://svelte.dev/e/effect_update_depth_exceeded

extracted_from_files

URL
detected URL: https://svelte.dev/e/props_invalid_value

XIOC detected URL: https://svelte.dev/e/props_invalid_value

extracted_from_files

URL
detected URL: https://svelte.dev/e/state_descriptors_fixed

XIOC detected URL: https://svelte.dev/e/state_descriptors_fixed

extracted_from_files

URL
detected URL: https://svelte.dev/e/state_prototype_fixed

XIOC detected URL: https://svelte.dev/e/state_prototype_fixed

extracted_from_files

Domain
detected Domain: n.timestamps.map

XIOC detected Domain: n.timestamps.map

extracted_from_files

Domain
detected Domain: e.name

XIOC detected Domain: e.name

extracted_from_files

Domain
detected Domain: this.locationwatcher.run

XIOC detected Domain: this.locationwatcher.run

extracted_from_files

URL
detected URL: http://addons.mozilla.org/ca/crl.pem0N

XIOC detected URL: http://addons.mozilla.org/ca/crl.pem0N

extracted_from_files

URL
detected URL: https://svelte.dev/e/lifecycle_outside_component

XIOC detected URL: https://svelte.dev/e/lifecycle_outside_component

extracted_from_files

URL
detected URL: https://svelte.dev/e/async_derived_orphan

XIOC detected URL: https://svelte.dev/e/async_derived_orphan

extracted_from_files

Domain
detected Domain: i.is

XIOC detected Domain: i.is

extracted_from_files

Domain
detected Domain: g.prev.next

XIOC detected Domain: g.prev.next

extracted_from_files

Domain
detected Domain: g.next

XIOC detected Domain: g.next

extracted_from_files

Domain
detected Domain: x.next

XIOC detected Domain: x.next

extracted_from_files

Domain
detected Domain: c.next

XIOC detected Domain: c.next

extracted_from_files

Domain
detected Domain: this.name

XIOC detected Domain: this.name

extracted_from_files

Domain
detected Domain: e.id

XIOC detected Domain: e.id

extracted_from_files

Domain
detected Domain: www.youtube.com

XIOC detected Domain: www.youtube.com

extracted_from_files

Domain
detected Domain: un.call

XIOC detected Domain: un.call

extracted_from_files

Domain
detected Domain: wn.call

XIOC detected Domain: wn.call

extracted_from_files

Domain
detected Domain: ve.call

XIOC detected Domain: ve.call

extracted_from_files

Domain
detected Domain: li.call

XIOC detected Domain: li.call

extracted_from_files

Domain
detected Domain: a.host

XIOC detected Domain: a.host

extracted_from_files

Domain
detected Domain: h.call

XIOC detected Domain: h.call

extracted_from_files

Domain
detected Domain: u.next

XIOC detected Domain: u.next

extracted_from_files

Domain
detected Domain: developer.mozilla.org

XIOC detected Domain: developer.mozilla.org

extracted_from_files

Domain
detected Domain: youtu.be

XIOC detected Domain: youtu.be

extracted_from_files

Domain
detected Domain: a.call

XIOC detected Domain: a.call

extracted_from_files

Domain
detected Domain: object.prototype.tostring.call

XIOC detected Domain: object.prototype.tostring.call

extracted_from_files

Domain
detected Domain: signingca1.addons.mozilla.org

XIOC detected Domain: signingca1.addons.mozilla.org

extracted_from_files

Domain
detected Domain: ye.call

XIOC detected Domain: ye.call

extracted_from_files

Domain
detected Domain: m.set.call

XIOC detected Domain: m.set.call

extracted_from_files

Domain
detected Domain: d.data

XIOC detected Domain: d.data

extracted_from_files

Domain
detected Domain: d.next

XIOC detected Domain: d.next

extracted_from_files

Domain
detected Domain: prev.next

XIOC detected Domain: prev.next

extracted_from_files

Domain
detected Domain: ee.next

XIOC detected Domain: ee.next

extracted_from_files

Domain
detected Domain: l.next

XIOC detected Domain: l.next

extracted_from_files

Domain
detected Domain: n.style

XIOC detected Domain: n.style

extracted_from_files

Domain
detected Domain: t.name

XIOC detected Domain: t.name

extracted_from_files

Domain
detected Domain: e.is

XIOC detected Domain: e.is

extracted_from_files

Domain
detected Domain: i.next

XIOC detected Domain: i.next

extracted_from_files

Domain
detected Domain: e.in

XIOC detected Domain: e.in

extracted_from_files

Domain
detected Domain: br.call

XIOC detected Domain: br.call

extracted_from_files

Domain
detected Domain: e.target

XIOC detected Domain: e.target

extracted_from_files

Domain
detected Domain: o.host

XIOC detected Domain: o.host

extracted_from_files

Domain
detected Domain: g.call

XIOC detected Domain: g.call

extracted_from_files

Domain
detected Domain: h.set.call

XIOC detected Domain: h.set.call

extracted_from_files

Domain
detected Domain: object.is

XIOC detected Domain: object.is

extracted_from_files

Domain
detected Domain: qt.call

XIOC detected Domain: qt.call

extracted_from_files

Domain
detected Domain: t.call

XIOC detected Domain: t.call

extracted_from_files

Domain
detected Domain: n.ac

XIOC detected Domain: n.ac

extracted_from_files

Domain
detected Domain: e.next

XIOC detected Domain: e.next

extracted_from_files

Domain
detected Domain: e.ac

XIOC detected Domain: e.ac

extracted_from_files

Domain
detected Domain: t.map

XIOC detected Domain: t.map

extracted_from_files

Domain
detected Domain: a.map

XIOC detected Domain: a.map

extracted_from_files

Domain
detected Domain: n.map

XIOC detected Domain: n.map

extracted_from_files

Domain
detected Domain: t.is

XIOC detected Domain: t.is

extracted_from_files

Domain
detected Domain: r.b.is

XIOC detected Domain: r.b.is

extracted_from_files

Domain
detected Domain: t.ac

XIOC detected Domain: t.ac

extracted_from_files

URL
detected URL: https://svelte.dev/e/each_key_duplicate

XIOC detected URL: https://svelte.dev/e/each_key_duplicate

extracted_from_files

Domain
detected Domain: n.is

XIOC detected Domain: n.is

extracted_from_files

Domain
detected Domain: n.id

XIOC detected Domain: n.id

extracted_from_files

Domain
detected Domain: r.ac

XIOC detected Domain: r.ac

extracted_from_files

Domain
detected Domain: n.call

XIOC detected Domain: n.call

extracted_from_files

Domain
detected Domain: n.next

XIOC detected Domain: n.next

extracted_from_files

Domain
detected Domain: t.next

XIOC detected Domain: t.next

extracted_from_files

Domain
detected Domain: this.parent.is

XIOC detected Domain: this.parent.is

extracted_from_files

Domain
detected Domain: www.patreon.com

XIOC detected Domain: www.patreon.com

extracted_from_files

Domain
detected Domain: n.data

XIOC detected Domain: n.data

extracted_from_files

Domain
detected Domain: e.data

XIOC detected Domain: e.data

extracted_from_files

Domain
detected Domain: this.is

XIOC detected Domain: this.is

extracted_from_files

Domain
detected Domain: r.next

XIOC detected Domain: r.next

extracted_from_files

Domain
detected Domain: c.id

XIOC detected Domain: c.id

extracted_from_files

Domain
detected Domain: this.id

XIOC detected Domain: this.id

extracted_from_files

Domain
detected Domain: mozilla.com

XIOC detected Domain: mozilla.com

extracted_from_files

Domain
detected Domain: content-signature.mozilla.org

XIOC detected Domain: content-signature.mozilla.org

extracted_from_files

Domain
detected Domain: teef80b59cfd089160d7cb58645908591.1a4d24e291848323b644bdeab69f030e.addons.mozilla.org

XIOC detected Domain: teef80b59cfd089160d7cb58645908591.1a4d24e291848323b644bdeab69f030e.addons.mozilla.org

extracted_from_files

Domain
detected Domain: globalthis.chrome

XIOC detected Domain: globalthis.chrome

extracted_from_files

Domain
detected Domain: t.id

XIOC detected Domain: t.id

extracted_from_files

Domain
detected Domain: n.tab.id

XIOC detected Domain: n.tab.id

extracted_from_files

Domain
detected Domain: svelte.dev

XIOC detected Domain: svelte.dev

extracted_from_files

URL
detected URL: https://youtu.be/$

XIOC detected URL: https://youtu.be/$

extracted_from_files

Security Analysis Summary

Security Analysis Overview

Timestamps for YouTube is a Firefox Add-ons extension published by weaving. Version 0.1.0 has been analyzed by the Risky Plugins security platform, receiving a risk score of 84.98/100 (HIGH risk) based on 121 security findings.

Risk Assessment

This extension presents critical security risk. Severe issues were detected, potentially including malware indicators, exposed secrets, or dangerous behaviors. Installation is strongly discouraged until these issues are addressed.

Findings Breakdown

  • High: 23 finding(s)
  • Medium: 98 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

Timestamps for YouTube is published by weaving on the Firefox Add-ons marketplace. The extension has approximately 8 users.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions