Is "OpenLink Structured Data Sniffer" on Firefox Add-ons Safe to Install?

OpenLink Software Inc · firefox · v3.4.27

This powerful browser extension adds the following functionality to your Firefox browser: Discovery of Structured Metadata (POSH, JSON-LD, Microdata, RDF-Turtle, and RDFa) embedded in HTML Documents Handling of content-types beyond HTML -- enables your browser to natively render JSON-LD and RDF-Turtle documentsF-Turtle documents A Web Service Console -- that simplifies RESTful interaction by exposing HTTP call parameters. A powerful mechanism for toggling Identity when working over TLS connections -- such that identity changes don't require browser restarts A "Copy & Paste" feature for exporting content from RDF-Turtle, RDFa, JSON-LD, or POSH tabs to RDF-Turtle or JSON-LD formatted clipboards, for reuse and remixing elsewhere CSV and JSON documents support with regards to data visualization. One-click saving of Structured Data to SPARQL-accessible Knowledge Graphs, subject to ACLs SuperLinks that connect words and phrases in current documents to entity descriptions across Knowledge Graphs, via a single-click

Risk Assessment

Pending
0
out of 100
MINIMAL

0 security findings detected across all analyzers

Firefox extension requesting 9 permissions

No Threats Detected

This extension passed all security checks

About This Extension

This powerful browser extension adds the following functionality to your Firefox browser: <ol><li>Discovery of Structured Metadata (POSH, JSON-LD, Microdata, RDF-Turtle, and RDFa) embedded in HTML Documents</li><li>Handling of content-types beyond HTML -- enables your browser to natively render JSON-LD and RDF-Turtle documentsF-Turtle documents</li><li>A Web Service Console -- that simplifies RESTful interaction by exposing HTTP call parameters. A powerful mechanism for toggling Identity when working over TLS connections -- such that identity changes don't require browser restarts</li><li>A "Copy &amp; Paste" feature for exporting content from RDF-Turtle, RDFa, JSON-LD, or POSH tabs to RDF-Turtle or JSON-LD formatted clipboards, for reuse and remixing elsewhere</li><li>CSV and JSON documents support with regards to data visualization.</li><li>One-click saving of Structured Data to SPARQL-accessible Knowledge Graphs, subject to ACLs</li><li>SuperLinks that connect words and phrases in current documents to entity descriptions across Knowledge Graphs, via a single-click</li></ol>

No Findings

All security checks passed

AI Security Report

AI Security Analysis: OpenLink Structured Data Sniffer

Analysis generated: 2025-12-11T20:55:21+13:00
Model: gemini-3-pro-preview


Quick Facts

Property Value
UUID ed057c90-8d1d-5400-a241-11d135cc93fa
Type firefox
Version
Users 409
Risk Score 100.0/100 (CRITICAL)
Malware Detected ⚠️ Yes
Secrets Exposed ✅ No
Critical Vulns ✅ No

AI Analysis

Here is the security analysis for the OpenLink Structured Data Sniffer extension.

Executive Summary

The OpenLink Structured Data Sniffer extension presents a CRITICAL security risk to the organization. Automated analysis has flagged this extension with a maximum risk score of 100/100 due to the presence of multiple high-severity malware signatures, including indicators of system command execution, registry modification, and obfuscated code. Given the unverified publisher status and the aggressive nature of the detected behaviors, immediate removal and blocking of this extension are required.

Threat Assessment

The security posture of this extension is extremely poor, exhibiting behaviors typically associated with malicious payloads rather than a standard browser utility.

  • Malware Signatures: The analysis detected 239 malware-signature matches. The most concerning are the repeated postinstall_ tags (e.g., postinstall_system_command, postinstall_registry_modification). These suggest the extension attempts to execute code outside the browser sandbox, potentially modifying the underlying operating system, which is highly abnormal for a legitimate browser extension.
  • High Volume of IOCs: With over 4,500 Indicators of Compromise (IOCs) and network findings, the extension appears to communicate with a vast network of external endpoints. This traffic pattern is consistent with data exfiltration or command-and-control (C2) beaconing.
  • Obfuscation: The presence of 22 obfuscation findings indicates an intentional effort to hide code logic from analysis. While sometimes used for intellectual property protection, in conjunction with system commands and registry edits, it is a strong indicator of malicious intent.
  • Publisher Trust: The publisher, "OpenLink Software Inc," is unverified. Combined with a low user count (409), there is no community trust or reputation to counterbalance the technical findings.

Risk Justification

The 100/100 (CRITICAL) risk score is fully justified and potentially conservative given the findings.

  • Severity of Capabilities: The detected capabilities—specifically registry modification and system command execution—violate the principle of least privilege for browser extensions. A "Structured Data Sniffer" should only need to parse HTML/DOM content; it has no legitimate business need to modify the Windows registry or execute system commands.
  • Attack Surface: The sheer volume of findings (4,870) suggests a complex codebase with multiple potential vectors for exploitation or malicious activity.
  • Malware Confirmation: The malware-signature: true flag is not a heuristic warning but a confirmation of known malicious patterns matching YARA rules.

Key Findings

  • System Command Execution (postinstall_system_command): Multiple instances where the extension attempts to run commands on the host operating system. This is a primary vector for installing persistent malware.
  • Registry Modification (postinstall_registry_modification): The extension attempts to write to the system registry. This is often used by malware to ensure it restarts automatically when the computer reboots (persistence).
  • Crypto Operations (postinstall_crypto_operations): While this could be legitimate encryption, in this context, it raises concerns about ransomware behavior or the encryption of exfiltrated data.
  • File Manipulation & Download (postinstall_file_download, postinstall_file_manipulation): The extension appears capable of downloading external payloads and modifying local files, acting as a "dropper" for other malware.
  • Obfuscation Techniques: 22 instances of code obfuscation make it difficult to determine the precise logic of these operations, a common tactic to bypass automated security scanners.

Recommendations

  1. Immediate Removal: Force-uninstall this extension from all endpoints immediately via group policy or MDM solutions.
  2. Blocklist: Add the Extension UUID (ed057c90-8d1d-5400-a241-11d135cc93fa) to the organization's browser blocklist to prevent future installation.
  3. Incident Response: For any machines where this extension was installed:
    • Scan the device for secondary malware payloads (droppers).
    • Review system logs for unauthorized registry changes or command executions.
    • Reset credentials for any users who had this extension active, as data sniffing is a core function of the tool.
  4. Network Blocking: If specific domains were identified in the 4,580 IOCs (not listed in detail here), block them at the firewall/DNS level.

Mitigation Strategies

There are no safe mitigation strategies for this specific version of the extension. The risk is fundamental to the code's behavior (system-level access and malware signatures).

  • Alternative: If the business requirement is to inspect structured data (JSON-LD, Microdata, RDFa), users should utilize built-in browser developer tools or verified, open-source alternatives with strictly scoped permissions (e.g., extensions that only require activeTab permission and do not request management or native messaging permissions).

Confidence Assessment

Confidence Level: 80%

  • Supporting Factors: The high number of specific, high-severity YARA matches (Registry, System Command) provides strong evidence of malicious capability. The "Unverified" publisher status aligns with the risk profile.
  • Limiting Factors: The analysis relies on static analysis (YARA rules). While unlikely given the specific combination of "registry modification" and "system command" tags, there is a theoretical possibility that the extension includes a bundled library triggering these rules (false positive), though the behavior is still unacceptable for a browser extension. Dynamic analysis (sandboxing) would confirm if these commands are actually executed at runtime.

Disclaimer

This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.

Frequently Asked Questions