Is "DNSSEC/DANE Padlock" on Firefox Add-ons Safe to Install?

Seb35 · firefox · v0.2.5

This extension adds a padlock or a key when the website has the security technologies DNSSEC or even DANE, in which case it is a sign the website cares particularly about the security. It uses a DNS-over-HTTPS resolver, either a pre-defined one or a custom DoH resolver, but there are no calls to other API or server. You may configure the level of alert you want: a discrete icon in the address bar, or, in case of error, a notification or even a plain-page warning. This extension is based on a previous one, DNSSEC/DANE Validator by defkev under free license GPL 3; it was upgraded and a few features were added (a cache, a CSP, and internationalisation as of now).

Risk Assessment

Analyzed
84.74
out of 100
HIGH

341 security findings detected across all analyzers

Firefox extension requesting 6 permissions

Severity Breakdown

0
Critical
30
High
311
Medium
0
Low
0
Info

Finding Categories

30
Malware Signatures
307
IoC Indicators

YARA Rules Matched

9 rules(30 hits)
postinstall registry modification postinstall crypto operations postinstall file manipulation postinstall obfuscation postinstall system command postinstall network communication credential env files postinstall file download postinstall persistence mechanism

Requested Permissions

6 permissions
<all_urls>

Access and modify data on every website you visit

Dangerous
webRequest

Intercept, modify, and block all network requests

High
webRequestBlocking

Block network requests before they complete

High
tabs
Medium
notifications
Low
storage
Low

About This Extension

This extension adds a padlock or a key when the website has the security technologies DNSSEC or even DANE, in which case it is a sign the website cares particularly about the security. It uses a DNS-over-HTTPS resolver, either a pre-defined one or a custom DoH resolver, but there are no calls to other API or server. You may configure the level of alert you want: a discrete icon in the address bar, or, in case of error, a notification or even a plain-page warning. This extension is based on a previous one, DNSSEC/DANE Validator by defkev under free license GPL 3; it was upgraded and a few features were added (a cache, a CSP, and internationalisation as of now).

Detailed Findings

32 total

YARA Rule Matches

9 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
27
IP Addresses
27
Domains
254
Strings
307

All Indicators · 307

Domain
detected Domain: this.listener.call

XIOC detected Domain: this.listener.call

extracted_from_files

Domain
detected Domain: me.name

XIOC detected Domain: me.name

extracted_from_files

Domain
detected Domain: k.prototype.tober.call

XIOC detected Domain: k.prototype.tober.call

extracted_from_files

URL
detected URL: https://dns.nextdns.io/dns-query

XIOC detected URL: https://dns.nextdns.io/dns-query

extracted_from_files

IP
detected IP: 2.5.29.19

XIOC detected IP: 2.5.29.19

extracted_from_files

IP
detected IP: 2.5.29.18

XIOC detected IP: 2.5.29.18

extracted_from_files

IP
detected IP: 2.5.29.17

XIOC detected IP: 2.5.29.17

extracted_from_files

IP
detected IP: 2.5.29.16

XIOC detected IP: 2.5.29.16

extracted_from_files

IP
detected IP: 2.5.29.15

XIOC detected IP: 2.5.29.15

extracted_from_files

IP
detected IP: 2.5.29.14

XIOC detected IP: 2.5.29.14

extracted_from_files

IP
detected IP: 2.5.29.9

XIOC detected IP: 2.5.29.9

extracted_from_files

IP
detected IP: 2.5.29.30

XIOC detected IP: 2.5.29.30

extracted_from_files

IP
detected IP: 2.5.29.29

XIOC detected IP: 2.5.29.29

extracted_from_files

IP
detected IP: 2.5.29.28

XIOC detected IP: 2.5.29.28

extracted_from_files

IP
detected IP: 2.5.29.24

XIOC detected IP: 2.5.29.24

extracted_from_files

IP
detected IP: 2.5.29.21

XIOC detected IP: 2.5.29.21

extracted_from_files

IP
detected IP: 2.5.29.27

XIOC detected IP: 2.5.29.27

extracted_from_files

IP
detected IP: 2.5.29.20

XIOC detected IP: 2.5.29.20

extracted_from_files

IP
detected IP: 2.5.29.37

XIOC detected IP: 2.5.29.37

extracted_from_files

IP
detected IP: 2.5.29.36

XIOC detected IP: 2.5.29.36

extracted_from_files

IP
detected IP: 2.5.29.35

XIOC detected IP: 2.5.29.35

extracted_from_files

IP
detected IP: 2.5.29.33

XIOC detected IP: 2.5.29.33

extracted_from_files

IP
detected IP: 2.5.29.32

XIOC detected IP: 2.5.29.32

extracted_from_files

IP
detected IP: 2.5.29.46

XIOC detected IP: 2.5.29.46

extracted_from_files

IP
detected IP: 2.5.29.31

XIOC detected IP: 2.5.29.31

extracted_from_files

Domain
detected Domain: signingca1.addons.mozilla.org

XIOC detected Domain: signingca1.addons.mozilla.org

extracted_from_files

Domain
detected Domain: license.md

XIOC detected Domain: license.md

extracted_from_files

Domain
detected Domain: fontawesome.com

XIOC detected Domain: fontawesome.com

extracted_from_files

Domain
detected Domain: github.com

XIOC detected Domain: github.com

extracted_from_files

IP
detected IP: 1::

XIOC detected IP: 1::

extracted_from_files

IP
detected IP: ::1

XIOC detected IP: ::1

extracted_from_files

IP
detected IP: 2.5.29.54

XIOC detected IP: 2.5.29.54

extracted_from_files

Domain
detected Domain: t.tab.id

XIOC detected Domain: t.tab.id

extracted_from_files

Domain
detected Domain: dns.nextdns.io

XIOC detected Domain: dns.nextdns.io

extracted_from_files

Domain
detected Domain: dnssec-failed.org

XIOC detected Domain: dnssec-failed.org

extracted_from_files

Domain
detected Domain: t70f3d49aaca908ff2eee706b68c7defe.fe3e09f8aab3de86d012cffa85e7d7a9.addons.mozilla.org

XIOC detected Domain: t70f3d49aaca908ff2eee706b68c7defe.fe3e09f8aab3de86d012cffa85e7d7a9.addons.mozilla.org

extracted_from_files

Domain
detected Domain: content-signature.mozilla.org

XIOC detected Domain: content-signature.mozilla.org

extracted_from_files

Domain
detected Domain: addons.mozilla.org

XIOC detected Domain: addons.mozilla.org

extracted_from_files

Domain
detected Domain: mozilla.com

XIOC detected Domain: mozilla.com

extracted_from_files

Domain
detected Domain: m.map

XIOC detected Domain: m.map

extracted_from_files

Domain
detected Domain: r.md

XIOC detected Domain: r.md

extracted_from_files

Domain
detected Domain: e.name

XIOC detected Domain: e.name

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: n.issuer.typesandvalues.map

XIOC detected Domain: n.issuer.typesandvalues.map

extracted_from_files

Domain
detected Domain: t.map

XIOC detected Domain: t.map

extracted_from_files

Domain
detected Domain: browser.pageaction.show

XIOC detected Domain: browser.pageaction.show

extracted_from_files

Domain
detected Domain: this.cl

XIOC detected Domain: this.cl

extracted_from_files

Domain
detected Domain: this.ch

XIOC detected Domain: this.ch

extracted_from_files

Domain
detected Domain: this.bh

XIOC detected Domain: this.bh

extracted_from_files

Domain
detected Domain: this.al

XIOC detected Domain: this.al

extracted_from_files

Domain
detected Domain: c.map

XIOC detected Domain: c.map

extracted_from_files

Domain
detected Domain: e.map

XIOC detected Domain: e.map

extracted_from_files

Domain
detected Domain: k.map

XIOC detected Domain: k.map

extracted_from_files

Domain
detected Domain: this.constructor.name

XIOC detected Domain: this.constructor.name

extracted_from_files

Domain
detected Domain: this.name

XIOC detected Domain: this.name

extracted_from_files

Domain
detected Domain: t.name

XIOC detected Domain: t.name

extracted_from_files

Domain
detected Domain: tostring.call

XIOC detected Domain: tostring.call

extracted_from_files

Domain
detected Domain: e.constructor.name

XIOC detected Domain: e.constructor.name

extracted_from_files

Domain
detected Domain: this.gl

XIOC detected Domain: this.gl

extracted_from_files

Domain
detected Domain: this.gh

XIOC detected Domain: this.gh

extracted_from_files

Domain
detected Domain: r.name

XIOC detected Domain: r.name

extracted_from_files

Domain
detected Domain: s.name

XIOC detected Domain: s.name

extracted_from_files

Domain
detected Domain: r.final

XIOC detected Domain: r.final

extracted_from_files

Domain
detected Domain: ee.name

XIOC detected Domain: ee.name

extracted_from_files

Domain
detected Domain: z.name

XIOC detected Domain: z.name

extracted_from_files

Domain
detected Domain: v.name

XIOC detected Domain: v.name

extracted_from_files

Domain
detected Domain: w.name

XIOC detected Domain: w.name

extracted_from_files

Domain
detected Domain: c.name

XIOC detected Domain: c.name

extracted_from_files

Domain
detected Domain: u.name

XIOC detected Domain: u.name

extracted_from_files

Domain
detected Domain: k.name

XIOC detected Domain: k.name

extracted_from_files

Domain
detected Domain: constructor.name

XIOC detected Domain: constructor.name

extracted_from_files

Domain
detected Domain: a.result.constructor.name

XIOC detected Domain: a.result.constructor.name

extracted_from_files

Domain
detected Domain: b.date

XIOC detected Domain: b.date

extracted_from_files

Domain
detected Domain: re.name

XIOC detected Domain: re.name

extracted_from_files

Domain
detected Domain: l.search

XIOC detected Domain: l.search

extracted_from_files

Domain
detected Domain: r.data

XIOC detected Domain: r.data

extracted_from_files

Domain
detected Domain: function.prototype.apply.call

XIOC detected Domain: function.prototype.apply.call

extracted_from_files

Domain
detected Domain: k.prototype.fromber.call

XIOC detected Domain: k.prototype.fromber.call

extracted_from_files

Domain
detected Domain: b.name

XIOC detected Domain: b.name

extracted_from_files

Domain
detected Domain: he.name

XIOC detected Domain: he.name

extracted_from_files

Domain
detected Domain: f.utildecodetc.call

XIOC detected Domain: f.utildecodetc.call

extracted_from_files

Domain
detected Domain: ce.name

XIOC detected Domain: ce.name

extracted_from_files

Domain
detected Domain: ke.name

XIOC detected Domain: ke.name

extracted_from_files

Domain
detected Domain: i.name

XIOC detected Domain: i.name

extracted_from_files

Domain
detected Domain: se.name

XIOC detected Domain: se.name

extracted_from_files

Domain
detected Domain: pe.name

XIOC detected Domain: pe.name

extracted_from_files

Domain
detected Domain: de.name

XIOC detected Domain: de.name

extracted_from_files

Domain
detected Domain: i.constructor.name

XIOC detected Domain: i.constructor.name

extracted_from_files

Domain
detected Domain: p.name

XIOC detected Domain: p.name

extracted_from_files

Domain
detected Domain: te.name

XIOC detected Domain: te.name

extracted_from_files

Domain
detected Domain: ue.name

XIOC detected Domain: ue.name

extracted_from_files

Domain
detected Domain: xe.name

XIOC detected Domain: xe.name

extracted_from_files

Domain
detected Domain: ie.name

XIOC detected Domain: ie.name

extracted_from_files

Domain
detected Domain: ve.name

XIOC detected Domain: ve.name

extracted_from_files

Domain
detected Domain: be.name

XIOC detected Domain: be.name

extracted_from_files

Domain
detected Domain: tt.name

XIOC detected Domain: tt.name

extracted_from_files

Domain
detected Domain: ze.name

XIOC detected Domain: ze.name

extracted_from_files

Domain
detected Domain: we.name

XIOC detected Domain: we.name

extracted_from_files

Domain
detected Domain: qe.name

XIOC detected Domain: qe.name

extracted_from_files

Domain
detected Domain: je.name

XIOC detected Domain: je.name

extracted_from_files

Domain
detected Domain: x.name

XIOC detected Domain: x.name

extracted_from_files

Domain
detected Domain: le.name

XIOC detected Domain: le.name

extracted_from_files

Domain
detected Domain: mt.name

XIOC detected Domain: mt.name

extracted_from_files

Domain
detected Domain: ht.name

XIOC detected Domain: ht.name

extracted_from_files

Domain
detected Domain: this.day

XIOC detected Domain: this.day

extracted_from_files

Domain
detected Domain: ut.name

XIOC detected Domain: ut.name

extracted_from_files

Domain
detected Domain: it.name

XIOC detected Domain: it.name

extracted_from_files

Domain
detected Domain: o.name

XIOC detected Domain: o.name

extracted_from_files

Domain
detected Domain: st.name

XIOC detected Domain: st.name

extracted_from_files

Domain
detected Domain: f.compare

XIOC detected Domain: f.compare

extracted_from_files

Domain
detected Domain: e.data

XIOC detected Domain: e.data

extracted_from_files

Domain
detected Domain: e.foo

XIOC detected Domain: e.foo

extracted_from_files

Domain
detected Domain: e.date

XIOC detected Domain: e.date

extracted_from_files

Domain
detected Domain: vt.name

XIOC detected Domain: vt.name

extracted_from_files

Domain
detected Domain: yt.name

XIOC detected Domain: yt.name

extracted_from_files

Domain
detected Domain: gt.name

XIOC detected Domain: gt.name

extracted_from_files

Domain
detected Domain: o.id

XIOC detected Domain: o.id

extracted_from_files

Domain
detected Domain: uint8array.prototype.set.call

XIOC detected Domain: uint8array.prototype.set.call

extracted_from_files

Domain
detected Domain: a.read

XIOC detected Domain: a.read

extracted_from_files

Domain
detected Domain: array.prototype.slice.call

XIOC detected Domain: array.prototype.slice.call

extracted_from_files

Domain
detected Domain: uint8array.prototype.lastindexof.call

XIOC detected Domain: uint8array.prototype.lastindexof.call

extracted_from_files

Domain
detected Domain: uint8array.prototype.indexof.call

XIOC detected Domain: uint8array.prototype.indexof.call

extracted_from_files

Domain
detected Domain: f.prototype.compare

XIOC detected Domain: f.prototype.compare

extracted_from_files

Domain
detected Domain: e.stream

XIOC detected Domain: e.stream

extracted_from_files

Domain
detected Domain: this.stream

XIOC detected Domain: this.stream

extracted_from_files

Domain
detected Domain: object.prototype.hasownproperty.call

XIOC detected Domain: object.prototype.hasownproperty.call

extracted_from_files

Domain
detected Domain: i.right.id

XIOC detected Domain: i.right.id

extracted_from_files

Domain
detected Domain: i.left.id

XIOC detected Domain: i.left.id

extracted_from_files

Domain
detected Domain: o.right.id

XIOC detected Domain: o.right.id

extracted_from_files

Domain
detected Domain: i.id

XIOC detected Domain: i.id

extracted_from_files

Domain
detected Domain: function.prototype.call

XIOC detected Domain: function.prototype.call

extracted_from_files

Domain
detected Domain: s.call

XIOC detected Domain: s.call

extracted_from_files

Domain
detected Domain: left.id

XIOC detected Domain: left.id

extracted_from_files

Domain
detected Domain: right.id

XIOC detected Domain: right.id

extracted_from_files

Domain
detected Domain: r.right.id

XIOC detected Domain: r.right.id

extracted_from_files

Domain
detected Domain: r.left.id

XIOC detected Domain: r.left.id

extracted_from_files

Domain
detected Domain: r.id

XIOC detected Domain: r.id

extracted_from_files

Domain
detected Domain: s.exchange

XIOC detected Domain: s.exchange

extracted_from_files

Domain
detected Domain: e.exchange

XIOC detected Domain: e.exchange

extracted_from_files

Domain
detected Domain: a.mx

XIOC detected Domain: a.mx

extracted_from_files

Domain
detected Domain: s.target

XIOC detected Domain: s.target

extracted_from_files

Domain
detected Domain: e.target

XIOC detected Domain: e.target

extracted_from_files

Domain
detected Domain: e.id

XIOC detected Domain: e.id

extracted_from_files

Domain
detected Domain: a.name

XIOC detected Domain: a.name

extracted_from_files

Domain
detected Domain: s.services

XIOC detected Domain: s.services

extracted_from_files

Domain
detected Domain: e.services

XIOC detected Domain: e.services

extracted_from_files

Domain
detected Domain: c.secure

XIOC detected Domain: c.secure

extracted_from_files

Domain
detected Domain: c.zone

XIOC detected Domain: c.zone

extracted_from_files

Domain
detected Domain: s.family

XIOC detected Domain: s.family

extracted_from_files

Domain
detected Domain: s.data

XIOC detected Domain: s.data

extracted_from_files

Domain
detected Domain: e.family

XIOC detected Domain: e.family

extracted_from_files

Domain
detected Domain: this.target

XIOC detected Domain: this.target

extracted_from_files

Domain
detected Domain: example.com

XIOC detected Domain: example.com

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

URL
detected URL: https://dns.google/dns-query

XIOC detected URL: https://dns.google/dns-query

extracted_from_files

URL
detected URL: https://doh.opendns.com/dns-query

XIOC detected URL: https://doh.opendns.com/dns-query

extracted_from_files

URL
detected URL: https://cloudflare-dns.com/dns-query

XIOC detected URL: https://cloudflare-dns.com/dns-query

extracted_from_files

Domain
detected Domain: t.data

XIOC detected Domain: t.data

extracted_from_files

Domain
detected Domain: a.call

XIOC detected Domain: a.call

extracted_from_files

Domain
detected Domain: object.prototype.propertyisenumerable.call

XIOC detected Domain: object.prototype.propertyisenumerable.call

extracted_from_files

Domain
detected Domain: object.prototype.tostring.call

XIOC detected Domain: object.prototype.tostring.call

extracted_from_files

Domain
detected Domain: o.call

XIOC detected Domain: o.call

extracted_from_files

Domain
detected Domain: slice.call

XIOC detected Domain: slice.call

extracted_from_files

Domain
detected Domain: p.call

XIOC detected Domain: p.call

extracted_from_files

Domain
detected Domain: i.prototype.off

XIOC detected Domain: i.prototype.off

extracted_from_files

Domain
detected Domain: t.call

XIOC detected Domain: t.call

extracted_from_files

Domain
detected Domain: ee.call

XIOC detected Domain: ee.call

extracted_from_files

Domain
detected Domain: d.call

XIOC detected Domain: d.call

extracted_from_files

Domain
detected Domain: l.call

XIOC detected Domain: l.call

extracted_from_files

Domain
detected Domain: r.read

XIOC detected Domain: r.read

extracted_from_files

Domain
detected Domain: s.get.call

XIOC detected Domain: s.get.call

extracted_from_files

Domain
detected Domain: s.request.call

XIOC detected Domain: s.request.call

extracted_from_files

Domain
detected Domain: z.call

XIOC detected Domain: z.call

extracted_from_files

Domain
detected Domain: x.call

XIOC detected Domain: x.call

extracted_from_files

Domain
detected Domain: i.call

XIOC detected Domain: i.call

extracted_from_files

Domain
detected Domain: u.call

XIOC detected Domain: u.call

extracted_from_files

Domain
detected Domain: q.call

XIOC detected Domain: q.call

extracted_from_files

Domain
detected Domain: r.call

XIOC detected Domain: r.call

extracted_from_files

Domain
detected Domain: h.call

XIOC detected Domain: h.call

extracted_from_files

Domain
detected Domain: r.map

XIOC detected Domain: r.map

extracted_from_files

Domain
detected Domain: w.call

XIOC detected Domain: w.call

extracted_from_files

Domain
detected Domain: n.call

XIOC detected Domain: n.call

extracted_from_files

Domain
detected Domain: y.call

XIOC detected Domain: y.call

extracted_from_files

Domain
detected Domain: g.call

XIOC detected Domain: g.call

extracted_from_files

Domain
detected Domain: b.call

XIOC detected Domain: b.call

extracted_from_files

Domain
detected Domain: r.constructor.name

XIOC detected Domain: r.constructor.name

extracted_from_files

Domain
detected Domain: t.id

XIOC detected Domain: t.id

extracted_from_files

Domain
detected Domain: this.id

XIOC detected Domain: this.id

extracted_from_files

Domain
detected Domain: e.ca

XIOC detected Domain: e.ca

extracted_from_files

Domain
detected Domain: t.ca

XIOC detected Domain: t.ca

extracted_from_files

Domain
detected Domain: this.ca

XIOC detected Domain: this.ca

extracted_from_files

Domain
detected Domain: r.network

XIOC detected Domain: r.network

extracted_from_files

Domain
detected Domain: r.country

XIOC detected Domain: r.country

extracted_from_files

Domain
detected Domain: e.algorithm.hash.name

XIOC detected Domain: e.algorithm.hash.name

extracted_from_files

Domain
detected Domain: e.algorithm.name

XIOC detected Domain: e.algorithm.name

extracted_from_files

Domain
detected Domain: m.hash.name

XIOC detected Domain: m.hash.name

extracted_from_files

Domain
detected Domain: e.contentencryptionalgorithm.name

XIOC detected Domain: e.contentencryptionalgorithm.name

extracted_from_files

Domain
detected Domain: c.octetstring.prototype.getvalue.call

XIOC detected Domain: c.octetstring.prototype.getvalue.call

extracted_from_files

Domain
detected Domain: t.prime

XIOC detected Domain: t.prime

extracted_from_files

Domain
detected Domain: this.prime

XIOC detected Domain: this.prime

extracted_from_files

Domain
detected Domain: i.algorithm.hash.name

XIOC detected Domain: i.algorithm.hash.name

extracted_from_files

Domain
detected Domain: a.algorithm.name

XIOC detected Domain: a.algorithm.name

extracted_from_files

Domain
detected Domain: l.name

XIOC detected Domain: l.name

extracted_from_files

Domain
detected Domain: u.algorithm.algorithm.hash.name

XIOC detected Domain: u.algorithm.algorithm.hash.name

extracted_from_files

Domain
detected Domain: r.algorithm.algorithm.hash.name

XIOC detected Domain: r.algorithm.algorithm.hash.name

extracted_from_files

Domain
detected Domain: r.algorithm.name

XIOC detected Domain: r.algorithm.name

extracted_from_files

Domain
detected Domain: n.hash.name

XIOC detected Domain: n.hash.name

extracted_from_files

Domain
detected Domain: t.day

XIOC detected Domain: t.day

extracted_from_files

Domain
detected Domain: this.date

XIOC detected Domain: this.date

extracted_from_files

Domain
detected Domain: s.parsedvalue.ca

XIOC detected Domain: s.parsedvalue.ca

extracted_from_files

Domain
detected Domain: h.data

XIOC detected Domain: h.data

extracted_from_files

Domain
detected Domain: this.extensions.map

XIOC detected Domain: this.extensions.map

extracted_from_files

Domain
detected Domain: jm.pid

XIOC detected Domain: jm.pid

extracted_from_files

Domain
detected Domain: d.name

XIOC detected Domain: d.name

extracted_from_files

Domain
detected Domain: this.fun

XIOC detected Domain: this.fun

extracted_from_files

Domain
detected Domain: km.id

XIOC detected Domain: km.id

extracted_from_files

Domain
detected Domain: i.parsedvalue.ca

XIOC detected Domain: i.parsedvalue.ca

extracted_from_files

Domain
detected Domain: hash.name

XIOC detected Domain: hash.name

extracted_from_files

Domain
detected Domain: h.hash.name

XIOC detected Domain: h.hash.name

extracted_from_files

Domain
detected Domain: t.result.date

XIOC detected Domain: t.result.date

extracted_from_files

Domain
detected Domain: t.date

XIOC detected Domain: t.date

extracted_from_files

Domain
detected Domain: n.next

XIOC detected Domain: n.next

extracted_from_files

Domain
detected Domain: s.next

XIOC detected Domain: s.next

extracted_from_files

Domain
detected Domain: symbol.prototype.tostring.call

XIOC detected Domain: symbol.prototype.tostring.call

extracted_from_files

Domain
detected Domain: c.call

XIOC detected Domain: c.call

extracted_from_files

Domain
detected Domain: s.global

XIOC detected Domain: s.global

extracted_from_files

Domain
detected Domain: s.off

XIOC detected Domain: s.off

extracted_from_files

Domain
detected Domain: p.prototype.run

XIOC detected Domain: p.prototype.run

extracted_from_files

Hash
detected MD5 Hash: fe3e09f8aab3de86d012cffa85e7d7a9

XIOC detected MD5 Hash: fe3e09f8aab3de86d012cffa85e7d7a9

extracted_from_files

URL
detected URL: https://doh.example.com/dns-query

XIOC detected URL: https://doh.example.com/dns-query

extracted_from_files

URL
detected URL: https://dns.quad9.net/dns-query

XIOC detected URL: https://dns.quad9.net/dns-query

extracted_from_files

Domain
detected Domain: t.open

XIOC detected Domain: t.open

extracted_from_files

Domain
detected Domain: e.host

XIOC detected Domain: e.host

extracted_from_files

Domain
detected Domain: h.location.protocol.search

XIOC detected Domain: h.location.protocol.search

extracted_from_files

Domain
detected Domain: e.next

XIOC detected Domain: e.next

extracted_from_files

Domain
detected Domain: r.next

XIOC detected Domain: r.next

extracted_from_files

Domain
detected Domain: e.read

XIOC detected Domain: e.read

extracted_from_files

Domain
detected Domain: t.exports.codes

XIOC detected Domain: t.exports.codes

extracted_from_files

Domain
detected Domain: r.prototype.name

XIOC detected Domain: r.prototype.name

extracted_from_files

Domain
detected Domain: i.read

XIOC detected Domain: i.read

extracted_from_files

Domain
detected Domain: f.readable.call

XIOC detected Domain: f.readable.call

extracted_from_files

Domain
detected Domain: n.writable.prototype.end.call

XIOC detected Domain: n.writable.prototype.end.call

extracted_from_files

Domain
detected Domain: t.next

XIOC detected Domain: t.next

extracted_from_files

Domain
detected Domain: this.next

XIOC detected Domain: this.next

extracted_from_files

Domain
detected Domain: destroy.call

XIOC detected Domain: destroy.call

extracted_from_files

Domain
detected Domain: u.prototype.push.call

XIOC detected Domain: u.prototype.push.call

extracted_from_files

Domain
detected Domain: n.prototype.removelistener.call

XIOC detected Domain: n.prototype.removelistener.call

extracted_from_files

Domain
detected Domain: n.prototype.on.call

XIOC detected Domain: n.prototype.on.call

extracted_from_files

Domain
detected Domain: k.prototype.read

XIOC detected Domain: k.prototype.read

extracted_from_files

Domain
detected Domain: this.tail.next

XIOC detected Domain: this.tail.next

extracted_from_files

Domain
detected Domain: f.prototype.copy.call

XIOC detected Domain: f.prototype.copy.call

extracted_from_files

Domain
detected Domain: t.corkedrequestsfree.next

XIOC detected Domain: t.corkedrequestsfree.next

extracted_from_files

Domain
detected Domain: a.next

XIOC detected Domain: a.next

extracted_from_files

Domain
detected Domain: c.next

XIOC detected Domain: c.next

extracted_from_files

Domain
detected Domain: e.final

XIOC detected Domain: e.final

extracted_from_files

Domain
detected Domain: k.call

XIOC detected Domain: k.call

extracted_from_files

Domain
detected Domain: v.prototype.format.call

XIOC detected Domain: v.prototype.format.call

extracted_from_files

Domain
detected Domain: this.search

XIOC detected Domain: this.search

extracted_from_files

Domain
detected Domain: this.host

XIOC detected Domain: this.host

extracted_from_files

Domain
detected Domain: r.stream

XIOC detected Domain: r.stream

extracted_from_files

Domain
detected Domain: n.map

XIOC detected Domain: n.map

extracted_from_files

Domain
detected Domain: this.head.next

XIOC detected Domain: this.head.next

extracted_from_files

Domain
detected Domain: this.head.data

XIOC detected Domain: this.head.data

extracted_from_files

Domain
detected Domain: registry.npmjs.org

XIOC detected Domain: registry.npmjs.org

extracted_from_files

Domain
detected Domain: codeberg.org

XIOC detected Domain: codeberg.org

extracted_from_files

Domain
detected Domain: cyclonedx.org

XIOC detected Domain: cyclonedx.org

extracted_from_files

Domain
detected Domain: location.search

XIOC detected Domain: location.search

extracted_from_files

Domain
detected Domain: r.host

XIOC detected Domain: r.host

extracted_from_files

Domain
detected Domain: e.search

XIOC detected Domain: e.search

extracted_from_files

Domain
detected Domain: r.search

XIOC detected Domain: r.search

extracted_from_files

Domain
detected Domain: doh.opendns.com

XIOC detected Domain: doh.opendns.com

extracted_from_files

Domain
detected Domain: dns.google

XIOC detected Domain: dns.google

extracted_from_files

Domain
detected Domain: cloudflare-dns.com

XIOC detected Domain: cloudflare-dns.com

extracted_from_files

Domain
detected Domain: www.inkscape.org

XIOC detected Domain: www.inkscape.org

extracted_from_files

Domain
detected Domain: www.w3.org

XIOC detected Domain: www.w3.org

extracted_from_files

IP
detected Domain: fontawesome-free-5.15.4-web.zip

XIOC detected Domain: fontawesome-free-5.15.4-web.zip

extracted_from_files

Domain
detected Domain: use.fontawesome.com

XIOC detected Domain: use.fontawesome.com

extracted_from_files

URL
detected URL: https://github.com/PeculiarVentures/PKI.js/blob/master/LICENSE)

XIOC detected URL: https://github.com/PeculiarVentures/PKI.js/blob/master/LICENSE)

extracted_from_files

URL
detected URL: https://github.com/byu-imaal/dohjs/blob/master/LICENSE)

XIOC detected URL: https://github.com/byu-imaal/dohjs/blob/master/LICENSE)

extracted_from_files

Domain
detected Domain: data.secure

XIOC detected Domain: data.secure

extracted_from_files

Domain
detected Domain: event.target.name

XIOC detected Domain: event.target.name

extracted_from_files

Domain
detected Domain: event.target

XIOC detected Domain: event.target

extracted_from_files

Domain
detected Domain: doh.example.com

XIOC detected Domain: doh.example.com

extracted_from_files

Domain
detected Domain: dns.quad9.net

XIOC detected Domain: dns.quad9.net

extracted_from_files

URL
detected URL: https://codeberg.org/Seb35/DNSSEC-DANE_Padlock/issues

XIOC detected URL: https://codeberg.org/Seb35/DNSSEC-DANE_Padlock/issues

extracted_from_files

URL
detected URL: http://cyclonedx.org/schema/bom-1.6.schema.json

XIOC detected URL: http://cyclonedx.org/schema/bom-1.6.schema.json

extracted_from_files

URL
detected URL: https://example.com

XIOC detected URL: https://example.com

extracted_from_files

URL
detected URL: https://

XIOC detected URL: https://

extracted_from_files

URL
detected URL: http://addons.mozilla.org/ca/crl.pem0N

XIOC detected URL: http://addons.mozilla.org/ca/crl.pem0N

extracted_from_files

URL
detected URL: https://fontawesome.com/license)

XIOC detected URL: https://fontawesome.com/license)

extracted_from_files

URL
detected URL: https://github.com/PeculiarVentures/PKI.js/issues

XIOC detected URL: https://github.com/PeculiarVentures/PKI.js/issues

extracted_from_files

URL
detected URL: https://registry.npmjs.org/pkijs/-/pkijs-3.2.5.tgz

XIOC detected URL: https://registry.npmjs.org/pkijs/-/pkijs-3.2.5.tgz

extracted_from_files

URL
detected URL: https://github.com/byu-imaal/dohjs#readme

XIOC detected URL: https://github.com/byu-imaal/dohjs#readme

extracted_from_files

URL
detected URL: https://github.com/byu-imaal/dohjs.git

XIOC detected URL: https://github.com/byu-imaal/dohjs.git

extracted_from_files

URL
detected URL: https://github.com/byu-imaal/dohjs/issues

XIOC detected URL: https://github.com/byu-imaal/dohjs/issues

extracted_from_files

URL
detected URL: https://registry.npmjs.org/dohjs/-/dohjs-0.3.3.tgz

XIOC detected URL: https://registry.npmjs.org/dohjs/-/dohjs-0.3.3.tgz

extracted_from_files

URL
detected URL: https://codeberg.org/Seb35/DNSSEC-DANE_Padlock

XIOC detected URL: https://codeberg.org/Seb35/DNSSEC-DANE_Padlock

extracted_from_files

URL
detected URL: https://fontawesome.com/license/free

XIOC detected URL: https://fontawesome.com/license/free

extracted_from_files

URL
detected URL: https://fontawesome.com

XIOC detected URL: https://fontawesome.com

extracted_from_files

URL
detected URL: http://www.w3.org/2000/svg

XIOC detected URL: http://www.w3.org/2000/svg

extracted_from_files

URL
detected URL: https://use.fontawesome.com/releases/v5.15.4/fontawesome-free-5.15.4-web.zip

XIOC detected URL: https://use.fontawesome.com/releases/v5.15.4/fontawesome-free-5.15.4-web.zip

extracted_from_files

URL
detected URL: https://github.com/PeculiarVentures/PKI.js

XIOC detected URL: https://github.com/PeculiarVentures/PKI.js

extracted_from_files

URL
detected URL: https://github.com/PeculiarVentures/PKI.js.git

XIOC detected URL: https://github.com/PeculiarVentures/PKI.js.git

extracted_from_files

Domain
detected Domain: o.open

XIOC detected Domain: o.open

extracted_from_files

Domain
detected Domain: n.writable.call

XIOC detected Domain: n.writable.call

extracted_from_files

Domain
detected Domain: u.prototype.onasciiencoding.call

XIOC detected Domain: u.prototype.onasciiencoding.call

extracted_from_files

Domain
detected Domain: i.init.call

XIOC detected Domain: i.init.call

extracted_from_files

Security Analysis Summary

Security Analysis Overview

DNSSEC/DANE Padlock is a Firefox Add-ons extension published by Seb35. Version 0.2.5 has been analyzed by the Risky Plugins security platform, receiving a risk score of 84.74/100 (HIGH risk) based on 341 security findings.

Risk Assessment

This extension presents critical security risk. Severe issues were detected, potentially including malware indicators, exposed secrets, or dangerous behaviors. Installation is strongly discouraged until these issues are addressed.

Findings Breakdown

  • High: 30 finding(s)
  • Medium: 311 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

DNSSEC/DANE Padlock is published by Seb35 on the Firefox Add-ons marketplace. The extension has approximately 38 users.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions