Is "DNSSEC/DANE Padlock" on Firefox Add-ons Safe to Install?
This extension adds a padlock or a key when the website has the security technologies DNSSEC or even DANE, in which case it is a sign the website cares particularly about the security. It uses a DNS-over-HTTPS resolver, either a pre-defined one or a custom DoH resolver, but there are no calls to other API or server. You may configure the level of alert you want: a discrete icon in the address bar, or, in case of error, a notification or even a plain-page warning. This extension is based on a previous one, DNSSEC/DANE Validator by defkev under free license GPL 3; it was upgraded and a few features were added (a cache, a CSP, and internationalisation as of now).
Risk Assessment
Analyzed341 security findings detected across all analyzers
Firefox extension requesting 6 permissions
Severity Breakdown
Finding Categories
YARA Rules Matched
9 rules(30 hits)Requested Permissions
6 permissionsAccess and modify data on every website you visit
Intercept, modify, and block all network requests
Block network requests before they complete
About This Extension
Detailed Findings
32 totalYARA Rule Matches
9 rulesIndicators of Compromise
Network indicators, suspicious strings, and potential IoCs extracted during analysis
All Indicators · 307
detected Domain: this.listener.call XIOC detected Domain: this.listener.call
extracted_from_files
detected Domain: me.name XIOC detected Domain: me.name
extracted_from_files
detected Domain: k.prototype.tober.call XIOC detected Domain: k.prototype.tober.call
extracted_from_files
detected URL: https://dns.nextdns.io/dns-query XIOC detected URL: https://dns.nextdns.io/dns-query
extracted_from_files
detected IP: 2.5.29.19 XIOC detected IP: 2.5.29.19
extracted_from_files
detected IP: 2.5.29.18 XIOC detected IP: 2.5.29.18
extracted_from_files
detected IP: 2.5.29.17 XIOC detected IP: 2.5.29.17
extracted_from_files
detected IP: 2.5.29.16 XIOC detected IP: 2.5.29.16
extracted_from_files
detected IP: 2.5.29.15 XIOC detected IP: 2.5.29.15
extracted_from_files
detected IP: 2.5.29.14 XIOC detected IP: 2.5.29.14
extracted_from_files
detected IP: 2.5.29.9 XIOC detected IP: 2.5.29.9
extracted_from_files
detected IP: 2.5.29.30 XIOC detected IP: 2.5.29.30
extracted_from_files
detected IP: 2.5.29.29 XIOC detected IP: 2.5.29.29
extracted_from_files
detected IP: 2.5.29.28 XIOC detected IP: 2.5.29.28
extracted_from_files
detected IP: 2.5.29.24 XIOC detected IP: 2.5.29.24
extracted_from_files
detected IP: 2.5.29.21 XIOC detected IP: 2.5.29.21
extracted_from_files
detected IP: 2.5.29.27 XIOC detected IP: 2.5.29.27
extracted_from_files
detected IP: 2.5.29.20 XIOC detected IP: 2.5.29.20
extracted_from_files
detected IP: 2.5.29.37 XIOC detected IP: 2.5.29.37
extracted_from_files
detected IP: 2.5.29.36 XIOC detected IP: 2.5.29.36
extracted_from_files
detected IP: 2.5.29.35 XIOC detected IP: 2.5.29.35
extracted_from_files
detected IP: 2.5.29.33 XIOC detected IP: 2.5.29.33
extracted_from_files
detected IP: 2.5.29.32 XIOC detected IP: 2.5.29.32
extracted_from_files
detected IP: 2.5.29.46 XIOC detected IP: 2.5.29.46
extracted_from_files
detected IP: 2.5.29.31 XIOC detected IP: 2.5.29.31
extracted_from_files
detected Domain: signingca1.addons.mozilla.org XIOC detected Domain: signingca1.addons.mozilla.org
extracted_from_files
detected Domain: license.md XIOC detected Domain: license.md
extracted_from_files
detected Domain: fontawesome.com XIOC detected Domain: fontawesome.com
extracted_from_files
detected Domain: github.com XIOC detected Domain: github.com
extracted_from_files
detected IP: 1:: XIOC detected IP: 1::
extracted_from_files
detected IP: ::1 XIOC detected IP: ::1
extracted_from_files
detected IP: 2.5.29.54 XIOC detected IP: 2.5.29.54
extracted_from_files
detected Domain: t.tab.id XIOC detected Domain: t.tab.id
extracted_from_files
detected Domain: dns.nextdns.io XIOC detected Domain: dns.nextdns.io
extracted_from_files
detected Domain: dnssec-failed.org XIOC detected Domain: dnssec-failed.org
extracted_from_files
detected Domain: t70f3d49aaca908ff2eee706b68c7defe.fe3e09f8aab3de86d012cffa85e7d7a9.addons.mozilla.org XIOC detected Domain: t70f3d49aaca908ff2eee706b68c7defe.fe3e09f8aab3de86d012cffa85e7d7a9.addons.mozilla.org
extracted_from_files
detected Domain: content-signature.mozilla.org XIOC detected Domain: content-signature.mozilla.org
extracted_from_files
detected Domain: addons.mozilla.org XIOC detected Domain: addons.mozilla.org
extracted_from_files
detected Domain: mozilla.com XIOC detected Domain: mozilla.com
extracted_from_files
detected Domain: m.map XIOC detected Domain: m.map
extracted_from_files
detected Domain: r.md XIOC detected Domain: r.md
extracted_from_files
detected Domain: e.name XIOC detected Domain: e.name
extracted_from_files
detected Domain: date.now XIOC detected Domain: date.now
extracted_from_files
detected Domain: n.issuer.typesandvalues.map XIOC detected Domain: n.issuer.typesandvalues.map
extracted_from_files
detected Domain: t.map XIOC detected Domain: t.map
extracted_from_files
detected Domain: browser.pageaction.show XIOC detected Domain: browser.pageaction.show
extracted_from_files
detected Domain: this.cl XIOC detected Domain: this.cl
extracted_from_files
detected Domain: this.ch XIOC detected Domain: this.ch
extracted_from_files
detected Domain: this.bh XIOC detected Domain: this.bh
extracted_from_files
detected Domain: this.al XIOC detected Domain: this.al
extracted_from_files
detected Domain: c.map XIOC detected Domain: c.map
extracted_from_files
detected Domain: e.map XIOC detected Domain: e.map
extracted_from_files
detected Domain: k.map XIOC detected Domain: k.map
extracted_from_files
detected Domain: this.constructor.name XIOC detected Domain: this.constructor.name
extracted_from_files
detected Domain: this.name XIOC detected Domain: this.name
extracted_from_files
detected Domain: t.name XIOC detected Domain: t.name
extracted_from_files
detected Domain: tostring.call XIOC detected Domain: tostring.call
extracted_from_files
detected Domain: e.constructor.name XIOC detected Domain: e.constructor.name
extracted_from_files
detected Domain: this.gl XIOC detected Domain: this.gl
extracted_from_files
detected Domain: this.gh XIOC detected Domain: this.gh
extracted_from_files
detected Domain: r.name XIOC detected Domain: r.name
extracted_from_files
detected Domain: s.name XIOC detected Domain: s.name
extracted_from_files
detected Domain: r.final XIOC detected Domain: r.final
extracted_from_files
detected Domain: ee.name XIOC detected Domain: ee.name
extracted_from_files
detected Domain: z.name XIOC detected Domain: z.name
extracted_from_files
detected Domain: v.name XIOC detected Domain: v.name
extracted_from_files
detected Domain: w.name XIOC detected Domain: w.name
extracted_from_files
detected Domain: c.name XIOC detected Domain: c.name
extracted_from_files
detected Domain: u.name XIOC detected Domain: u.name
extracted_from_files
detected Domain: k.name XIOC detected Domain: k.name
extracted_from_files
detected Domain: constructor.name XIOC detected Domain: constructor.name
extracted_from_files
detected Domain: a.result.constructor.name XIOC detected Domain: a.result.constructor.name
extracted_from_files
detected Domain: b.date XIOC detected Domain: b.date
extracted_from_files
detected Domain: re.name XIOC detected Domain: re.name
extracted_from_files
detected Domain: l.search XIOC detected Domain: l.search
extracted_from_files
detected Domain: r.data XIOC detected Domain: r.data
extracted_from_files
detected Domain: function.prototype.apply.call XIOC detected Domain: function.prototype.apply.call
extracted_from_files
detected Domain: k.prototype.fromber.call XIOC detected Domain: k.prototype.fromber.call
extracted_from_files
detected Domain: b.name XIOC detected Domain: b.name
extracted_from_files
detected Domain: he.name XIOC detected Domain: he.name
extracted_from_files
detected Domain: f.utildecodetc.call XIOC detected Domain: f.utildecodetc.call
extracted_from_files
detected Domain: ce.name XIOC detected Domain: ce.name
extracted_from_files
detected Domain: ke.name XIOC detected Domain: ke.name
extracted_from_files
detected Domain: i.name XIOC detected Domain: i.name
extracted_from_files
detected Domain: se.name XIOC detected Domain: se.name
extracted_from_files
detected Domain: pe.name XIOC detected Domain: pe.name
extracted_from_files
detected Domain: de.name XIOC detected Domain: de.name
extracted_from_files
detected Domain: i.constructor.name XIOC detected Domain: i.constructor.name
extracted_from_files
detected Domain: p.name XIOC detected Domain: p.name
extracted_from_files
detected Domain: te.name XIOC detected Domain: te.name
extracted_from_files
detected Domain: ue.name XIOC detected Domain: ue.name
extracted_from_files
detected Domain: xe.name XIOC detected Domain: xe.name
extracted_from_files
detected Domain: ie.name XIOC detected Domain: ie.name
extracted_from_files
detected Domain: ve.name XIOC detected Domain: ve.name
extracted_from_files
detected Domain: be.name XIOC detected Domain: be.name
extracted_from_files
detected Domain: tt.name XIOC detected Domain: tt.name
extracted_from_files
detected Domain: ze.name XIOC detected Domain: ze.name
extracted_from_files
detected Domain: we.name XIOC detected Domain: we.name
extracted_from_files
detected Domain: qe.name XIOC detected Domain: qe.name
extracted_from_files
detected Domain: je.name XIOC detected Domain: je.name
extracted_from_files
detected Domain: x.name XIOC detected Domain: x.name
extracted_from_files
detected Domain: le.name XIOC detected Domain: le.name
extracted_from_files
detected Domain: mt.name XIOC detected Domain: mt.name
extracted_from_files
detected Domain: ht.name XIOC detected Domain: ht.name
extracted_from_files
detected Domain: this.day XIOC detected Domain: this.day
extracted_from_files
detected Domain: ut.name XIOC detected Domain: ut.name
extracted_from_files
detected Domain: it.name XIOC detected Domain: it.name
extracted_from_files
detected Domain: o.name XIOC detected Domain: o.name
extracted_from_files
detected Domain: st.name XIOC detected Domain: st.name
extracted_from_files
detected Domain: f.compare XIOC detected Domain: f.compare
extracted_from_files
detected Domain: e.data XIOC detected Domain: e.data
extracted_from_files
detected Domain: e.foo XIOC detected Domain: e.foo
extracted_from_files
detected Domain: e.date XIOC detected Domain: e.date
extracted_from_files
detected Domain: vt.name XIOC detected Domain: vt.name
extracted_from_files
detected Domain: yt.name XIOC detected Domain: yt.name
extracted_from_files
detected Domain: gt.name XIOC detected Domain: gt.name
extracted_from_files
detected Domain: o.id XIOC detected Domain: o.id
extracted_from_files
detected Domain: uint8array.prototype.set.call XIOC detected Domain: uint8array.prototype.set.call
extracted_from_files
detected Domain: a.read XIOC detected Domain: a.read
extracted_from_files
detected Domain: array.prototype.slice.call XIOC detected Domain: array.prototype.slice.call
extracted_from_files
detected Domain: uint8array.prototype.lastindexof.call XIOC detected Domain: uint8array.prototype.lastindexof.call
extracted_from_files
detected Domain: uint8array.prototype.indexof.call XIOC detected Domain: uint8array.prototype.indexof.call
extracted_from_files
detected Domain: f.prototype.compare XIOC detected Domain: f.prototype.compare
extracted_from_files
detected Domain: e.stream XIOC detected Domain: e.stream
extracted_from_files
detected Domain: this.stream XIOC detected Domain: this.stream
extracted_from_files
detected Domain: object.prototype.hasownproperty.call XIOC detected Domain: object.prototype.hasownproperty.call
extracted_from_files
detected Domain: i.right.id XIOC detected Domain: i.right.id
extracted_from_files
detected Domain: i.left.id XIOC detected Domain: i.left.id
extracted_from_files
detected Domain: o.right.id XIOC detected Domain: o.right.id
extracted_from_files
detected Domain: i.id XIOC detected Domain: i.id
extracted_from_files
detected Domain: function.prototype.call XIOC detected Domain: function.prototype.call
extracted_from_files
detected Domain: s.call XIOC detected Domain: s.call
extracted_from_files
detected Domain: left.id XIOC detected Domain: left.id
extracted_from_files
detected Domain: right.id XIOC detected Domain: right.id
extracted_from_files
detected Domain: r.right.id XIOC detected Domain: r.right.id
extracted_from_files
detected Domain: r.left.id XIOC detected Domain: r.left.id
extracted_from_files
detected Domain: r.id XIOC detected Domain: r.id
extracted_from_files
detected Domain: s.exchange XIOC detected Domain: s.exchange
extracted_from_files
detected Domain: e.exchange XIOC detected Domain: e.exchange
extracted_from_files
detected Domain: a.mx XIOC detected Domain: a.mx
extracted_from_files
detected Domain: s.target XIOC detected Domain: s.target
extracted_from_files
detected Domain: e.target XIOC detected Domain: e.target
extracted_from_files
detected Domain: e.id XIOC detected Domain: e.id
extracted_from_files
detected Domain: a.name XIOC detected Domain: a.name
extracted_from_files
detected Domain: s.services XIOC detected Domain: s.services
extracted_from_files
detected Domain: e.services XIOC detected Domain: e.services
extracted_from_files
detected Domain: c.secure XIOC detected Domain: c.secure
extracted_from_files
detected Domain: c.zone XIOC detected Domain: c.zone
extracted_from_files
detected Domain: s.family XIOC detected Domain: s.family
extracted_from_files
detected Domain: s.data XIOC detected Domain: s.data
extracted_from_files
detected Domain: e.family XIOC detected Domain: e.family
extracted_from_files
detected Domain: this.target XIOC detected Domain: this.target
extracted_from_files
detected Domain: example.com XIOC detected Domain: example.com
extracted_from_files
detected IP: :: XIOC detected IP: ::
extracted_from_files
detected URL: https://dns.google/dns-query XIOC detected URL: https://dns.google/dns-query
extracted_from_files
detected URL: https://doh.opendns.com/dns-query XIOC detected URL: https://doh.opendns.com/dns-query
extracted_from_files
detected URL: https://cloudflare-dns.com/dns-query XIOC detected URL: https://cloudflare-dns.com/dns-query
extracted_from_files
detected Domain: t.data XIOC detected Domain: t.data
extracted_from_files
detected Domain: a.call XIOC detected Domain: a.call
extracted_from_files
detected Domain: object.prototype.propertyisenumerable.call XIOC detected Domain: object.prototype.propertyisenumerable.call
extracted_from_files
detected Domain: object.prototype.tostring.call XIOC detected Domain: object.prototype.tostring.call
extracted_from_files
detected Domain: o.call XIOC detected Domain: o.call
extracted_from_files
detected Domain: slice.call XIOC detected Domain: slice.call
extracted_from_files
detected Domain: p.call XIOC detected Domain: p.call
extracted_from_files
detected Domain: i.prototype.off XIOC detected Domain: i.prototype.off
extracted_from_files
detected Domain: t.call XIOC detected Domain: t.call
extracted_from_files
detected Domain: ee.call XIOC detected Domain: ee.call
extracted_from_files
detected Domain: d.call XIOC detected Domain: d.call
extracted_from_files
detected Domain: l.call XIOC detected Domain: l.call
extracted_from_files
detected Domain: r.read XIOC detected Domain: r.read
extracted_from_files
detected Domain: s.get.call XIOC detected Domain: s.get.call
extracted_from_files
detected Domain: s.request.call XIOC detected Domain: s.request.call
extracted_from_files
detected Domain: z.call XIOC detected Domain: z.call
extracted_from_files
detected Domain: x.call XIOC detected Domain: x.call
extracted_from_files
detected Domain: i.call XIOC detected Domain: i.call
extracted_from_files
detected Domain: u.call XIOC detected Domain: u.call
extracted_from_files
detected Domain: q.call XIOC detected Domain: q.call
extracted_from_files
detected Domain: r.call XIOC detected Domain: r.call
extracted_from_files
detected Domain: h.call XIOC detected Domain: h.call
extracted_from_files
detected Domain: r.map XIOC detected Domain: r.map
extracted_from_files
detected Domain: w.call XIOC detected Domain: w.call
extracted_from_files
detected Domain: n.call XIOC detected Domain: n.call
extracted_from_files
detected Domain: y.call XIOC detected Domain: y.call
extracted_from_files
detected Domain: g.call XIOC detected Domain: g.call
extracted_from_files
detected Domain: b.call XIOC detected Domain: b.call
extracted_from_files
detected Domain: r.constructor.name XIOC detected Domain: r.constructor.name
extracted_from_files
detected Domain: t.id XIOC detected Domain: t.id
extracted_from_files
detected Domain: this.id XIOC detected Domain: this.id
extracted_from_files
detected Domain: e.ca XIOC detected Domain: e.ca
extracted_from_files
detected Domain: t.ca XIOC detected Domain: t.ca
extracted_from_files
detected Domain: this.ca XIOC detected Domain: this.ca
extracted_from_files
detected Domain: r.network XIOC detected Domain: r.network
extracted_from_files
detected Domain: r.country XIOC detected Domain: r.country
extracted_from_files
detected Domain: e.algorithm.hash.name XIOC detected Domain: e.algorithm.hash.name
extracted_from_files
detected Domain: e.algorithm.name XIOC detected Domain: e.algorithm.name
extracted_from_files
detected Domain: m.hash.name XIOC detected Domain: m.hash.name
extracted_from_files
detected Domain: e.contentencryptionalgorithm.name XIOC detected Domain: e.contentencryptionalgorithm.name
extracted_from_files
detected Domain: c.octetstring.prototype.getvalue.call XIOC detected Domain: c.octetstring.prototype.getvalue.call
extracted_from_files
detected Domain: t.prime XIOC detected Domain: t.prime
extracted_from_files
detected Domain: this.prime XIOC detected Domain: this.prime
extracted_from_files
detected Domain: i.algorithm.hash.name XIOC detected Domain: i.algorithm.hash.name
extracted_from_files
detected Domain: a.algorithm.name XIOC detected Domain: a.algorithm.name
extracted_from_files
detected Domain: l.name XIOC detected Domain: l.name
extracted_from_files
detected Domain: u.algorithm.algorithm.hash.name XIOC detected Domain: u.algorithm.algorithm.hash.name
extracted_from_files
detected Domain: r.algorithm.algorithm.hash.name XIOC detected Domain: r.algorithm.algorithm.hash.name
extracted_from_files
detected Domain: r.algorithm.name XIOC detected Domain: r.algorithm.name
extracted_from_files
detected Domain: n.hash.name XIOC detected Domain: n.hash.name
extracted_from_files
detected Domain: t.day XIOC detected Domain: t.day
extracted_from_files
detected Domain: this.date XIOC detected Domain: this.date
extracted_from_files
detected Domain: s.parsedvalue.ca XIOC detected Domain: s.parsedvalue.ca
extracted_from_files
detected Domain: h.data XIOC detected Domain: h.data
extracted_from_files
detected Domain: this.extensions.map XIOC detected Domain: this.extensions.map
extracted_from_files
detected Domain: jm.pid XIOC detected Domain: jm.pid
extracted_from_files
detected Domain: d.name XIOC detected Domain: d.name
extracted_from_files
detected Domain: this.fun XIOC detected Domain: this.fun
extracted_from_files
detected Domain: km.id XIOC detected Domain: km.id
extracted_from_files
detected Domain: i.parsedvalue.ca XIOC detected Domain: i.parsedvalue.ca
extracted_from_files
detected Domain: hash.name XIOC detected Domain: hash.name
extracted_from_files
detected Domain: h.hash.name XIOC detected Domain: h.hash.name
extracted_from_files
detected Domain: t.result.date XIOC detected Domain: t.result.date
extracted_from_files
detected Domain: t.date XIOC detected Domain: t.date
extracted_from_files
detected Domain: n.next XIOC detected Domain: n.next
extracted_from_files
detected Domain: s.next XIOC detected Domain: s.next
extracted_from_files
detected Domain: symbol.prototype.tostring.call XIOC detected Domain: symbol.prototype.tostring.call
extracted_from_files
detected Domain: c.call XIOC detected Domain: c.call
extracted_from_files
detected Domain: s.global XIOC detected Domain: s.global
extracted_from_files
detected Domain: s.off XIOC detected Domain: s.off
extracted_from_files
detected Domain: p.prototype.run XIOC detected Domain: p.prototype.run
extracted_from_files
detected MD5 Hash: fe3e09f8aab3de86d012cffa85e7d7a9 XIOC detected MD5 Hash: fe3e09f8aab3de86d012cffa85e7d7a9
extracted_from_files
detected URL: https://doh.example.com/dns-query XIOC detected URL: https://doh.example.com/dns-query
extracted_from_files
detected URL: https://dns.quad9.net/dns-query XIOC detected URL: https://dns.quad9.net/dns-query
extracted_from_files
detected Domain: t.open XIOC detected Domain: t.open
extracted_from_files
detected Domain: e.host XIOC detected Domain: e.host
extracted_from_files
detected Domain: h.location.protocol.search XIOC detected Domain: h.location.protocol.search
extracted_from_files
detected Domain: e.next XIOC detected Domain: e.next
extracted_from_files
detected Domain: r.next XIOC detected Domain: r.next
extracted_from_files
detected Domain: e.read XIOC detected Domain: e.read
extracted_from_files
detected Domain: t.exports.codes XIOC detected Domain: t.exports.codes
extracted_from_files
detected Domain: r.prototype.name XIOC detected Domain: r.prototype.name
extracted_from_files
detected Domain: i.read XIOC detected Domain: i.read
extracted_from_files
detected Domain: f.readable.call XIOC detected Domain: f.readable.call
extracted_from_files
detected Domain: n.writable.prototype.end.call XIOC detected Domain: n.writable.prototype.end.call
extracted_from_files
detected Domain: t.next XIOC detected Domain: t.next
extracted_from_files
detected Domain: this.next XIOC detected Domain: this.next
extracted_from_files
detected Domain: destroy.call XIOC detected Domain: destroy.call
extracted_from_files
detected Domain: u.prototype.push.call XIOC detected Domain: u.prototype.push.call
extracted_from_files
detected Domain: n.prototype.removelistener.call XIOC detected Domain: n.prototype.removelistener.call
extracted_from_files
detected Domain: n.prototype.on.call XIOC detected Domain: n.prototype.on.call
extracted_from_files
detected Domain: k.prototype.read XIOC detected Domain: k.prototype.read
extracted_from_files
detected Domain: this.tail.next XIOC detected Domain: this.tail.next
extracted_from_files
detected Domain: f.prototype.copy.call XIOC detected Domain: f.prototype.copy.call
extracted_from_files
detected Domain: t.corkedrequestsfree.next XIOC detected Domain: t.corkedrequestsfree.next
extracted_from_files
detected Domain: a.next XIOC detected Domain: a.next
extracted_from_files
detected Domain: c.next XIOC detected Domain: c.next
extracted_from_files
detected Domain: e.final XIOC detected Domain: e.final
extracted_from_files
detected Domain: k.call XIOC detected Domain: k.call
extracted_from_files
detected Domain: v.prototype.format.call XIOC detected Domain: v.prototype.format.call
extracted_from_files
detected Domain: this.search XIOC detected Domain: this.search
extracted_from_files
detected Domain: this.host XIOC detected Domain: this.host
extracted_from_files
detected Domain: r.stream XIOC detected Domain: r.stream
extracted_from_files
detected Domain: n.map XIOC detected Domain: n.map
extracted_from_files
detected Domain: this.head.next XIOC detected Domain: this.head.next
extracted_from_files
detected Domain: this.head.data XIOC detected Domain: this.head.data
extracted_from_files
detected Domain: registry.npmjs.org XIOC detected Domain: registry.npmjs.org
extracted_from_files
detected Domain: codeberg.org XIOC detected Domain: codeberg.org
extracted_from_files
detected Domain: cyclonedx.org XIOC detected Domain: cyclonedx.org
extracted_from_files
detected Domain: location.search XIOC detected Domain: location.search
extracted_from_files
detected Domain: r.host XIOC detected Domain: r.host
extracted_from_files
detected Domain: e.search XIOC detected Domain: e.search
extracted_from_files
detected Domain: r.search XIOC detected Domain: r.search
extracted_from_files
detected Domain: doh.opendns.com XIOC detected Domain: doh.opendns.com
extracted_from_files
detected Domain: dns.google XIOC detected Domain: dns.google
extracted_from_files
detected Domain: cloudflare-dns.com XIOC detected Domain: cloudflare-dns.com
extracted_from_files
detected Domain: www.inkscape.org XIOC detected Domain: www.inkscape.org
extracted_from_files
detected Domain: www.w3.org XIOC detected Domain: www.w3.org
extracted_from_files
detected Domain: fontawesome-free-5.15.4-web.zip XIOC detected Domain: fontawesome-free-5.15.4-web.zip
extracted_from_files
detected Domain: use.fontawesome.com XIOC detected Domain: use.fontawesome.com
extracted_from_files
detected URL: https://github.com/PeculiarVentures/PKI.js/blob/master/LICENSE) XIOC detected URL: https://github.com/PeculiarVentures/PKI.js/blob/master/LICENSE)
extracted_from_files
detected URL: https://github.com/byu-imaal/dohjs/blob/master/LICENSE) XIOC detected URL: https://github.com/byu-imaal/dohjs/blob/master/LICENSE)
extracted_from_files
detected Domain: data.secure XIOC detected Domain: data.secure
extracted_from_files
detected Domain: event.target.name XIOC detected Domain: event.target.name
extracted_from_files
detected Domain: event.target XIOC detected Domain: event.target
extracted_from_files
detected Domain: doh.example.com XIOC detected Domain: doh.example.com
extracted_from_files
detected Domain: dns.quad9.net XIOC detected Domain: dns.quad9.net
extracted_from_files
detected URL: https://codeberg.org/Seb35/DNSSEC-DANE_Padlock/issues XIOC detected URL: https://codeberg.org/Seb35/DNSSEC-DANE_Padlock/issues
extracted_from_files
detected URL: http://cyclonedx.org/schema/bom-1.6.schema.json XIOC detected URL: http://cyclonedx.org/schema/bom-1.6.schema.json
extracted_from_files
detected URL: https://example.com XIOC detected URL: https://example.com
extracted_from_files
detected URL: https:// XIOC detected URL: https://
extracted_from_files
detected URL: http://addons.mozilla.org/ca/crl.pem0N XIOC detected URL: http://addons.mozilla.org/ca/crl.pem0N
extracted_from_files
detected URL: https://fontawesome.com/license) XIOC detected URL: https://fontawesome.com/license)
extracted_from_files
detected URL: https://github.com/PeculiarVentures/PKI.js/issues XIOC detected URL: https://github.com/PeculiarVentures/PKI.js/issues
extracted_from_files
detected URL: https://registry.npmjs.org/pkijs/-/pkijs-3.2.5.tgz XIOC detected URL: https://registry.npmjs.org/pkijs/-/pkijs-3.2.5.tgz
extracted_from_files
detected URL: https://github.com/byu-imaal/dohjs#readme XIOC detected URL: https://github.com/byu-imaal/dohjs#readme
extracted_from_files
detected URL: https://github.com/byu-imaal/dohjs.git XIOC detected URL: https://github.com/byu-imaal/dohjs.git
extracted_from_files
detected URL: https://github.com/byu-imaal/dohjs/issues XIOC detected URL: https://github.com/byu-imaal/dohjs/issues
extracted_from_files
detected URL: https://registry.npmjs.org/dohjs/-/dohjs-0.3.3.tgz XIOC detected URL: https://registry.npmjs.org/dohjs/-/dohjs-0.3.3.tgz
extracted_from_files
detected URL: https://codeberg.org/Seb35/DNSSEC-DANE_Padlock XIOC detected URL: https://codeberg.org/Seb35/DNSSEC-DANE_Padlock
extracted_from_files
detected URL: https://fontawesome.com/license/free XIOC detected URL: https://fontawesome.com/license/free
extracted_from_files
detected URL: https://fontawesome.com XIOC detected URL: https://fontawesome.com
extracted_from_files
detected URL: http://www.w3.org/2000/svg XIOC detected URL: http://www.w3.org/2000/svg
extracted_from_files
detected URL: https://use.fontawesome.com/releases/v5.15.4/fontawesome-free-5.15.4-web.zip XIOC detected URL: https://use.fontawesome.com/releases/v5.15.4/fontawesome-free-5.15.4-web.zip
extracted_from_files
detected URL: https://github.com/PeculiarVentures/PKI.js XIOC detected URL: https://github.com/PeculiarVentures/PKI.js
extracted_from_files
detected URL: https://github.com/PeculiarVentures/PKI.js.git XIOC detected URL: https://github.com/PeculiarVentures/PKI.js.git
extracted_from_files
detected Domain: o.open XIOC detected Domain: o.open
extracted_from_files
detected Domain: n.writable.call XIOC detected Domain: n.writable.call
extracted_from_files
detected Domain: u.prototype.onasciiencoding.call XIOC detected Domain: u.prototype.onasciiencoding.call
extracted_from_files
detected Domain: i.init.call XIOC detected Domain: i.init.call
extracted_from_files
Security Analysis Summary
Security Analysis Overview
DNSSEC/DANE Padlock is a Firefox Add-ons extension published by Seb35. Version 0.2.5 has been analyzed by the Risky Plugins security platform, receiving a risk score of 84.74/100 (HIGH risk) based on 341 security findings.
Risk Assessment
This extension presents critical security risk. Severe issues were detected, potentially including malware indicators, exposed secrets, or dangerous behaviors. Installation is strongly discouraged until these issues are addressed.
Findings Breakdown
- High: 30 finding(s)
- Medium: 311 finding(s)
What Was Analyzed
The security assessment covers multiple analysis categories:
- Malware Detection: YARA rule matching against 2,400+ malware signatures
- Secret Detection: Scanning for exposed API keys, tokens, and credentials
- Static Analysis: Code-level security analysis for common vulnerability patterns
- Network Analysis: Detection of suspicious network communications and endpoints
- Obfuscation Detection: Identification of code obfuscation techniques
Developer Information
DNSSEC/DANE Padlock is published by Seb35 on the Firefox Add-ons marketplace. The extension has approximately 38 users.
Recommendation
This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace