Chatgpt Batch Delete Hist Chrome extension icon

Chatgpt Batch Delete Hist

✨ AI-Powered 🔍 Security Report Available
👥 2K+ users
📦 v2025.06.05
💾 337KiB
📅 2025-06-07
View on Chrome Web Store

Chrome will indicate if you already have this installed.

Overview

ChatGPT Batch Delete History Manager

Tags

Productivity/tools productivity/tools

Privacy Practices

Does not sell your data to third parties
Does not use data for unrelated purposes
v2025.06.05 Critical Scanned Feb 23, 2026

Security Analysis — Chatgpt Batch Delete Hist

Analyzed v2025.06.05 · Feb 23, 2026 · 12 JS files · 749 KB scanned

Permissions

storage activeTab

Code Patterns Detected

eval() used — can execute arbitrary code Makes HTTP requests

External Connections

reactjs.org www.w3.org chatgpt.com img.windchat.link github.com batch-delete-history-api.windchat.link vitejs.dev lodash.com openjsf.org underscorejs.org npms.io arkose-api.windchat.link +2 more

Package Contents 31 files · 887KB

📁_locales
📁en
{}messages.json279B
📁_metadata5KB
{}verified_contents.json5KB
📁assets786KB
📁css44KB
🎨Popup.chunk2.css510B
🎨contentStyle1749090062067.chunk.css2KB
🎨options.chunk.css21KB
🎨popup.chunk.css21KB
📁js735KB
📜EventTypes.ptzsGUtx.js71KBlarge
📜MoreApps.My-XLVgn.js341KBlarge
📜Popup.qaTjD45U.js4KB
📜_commonjsHelpers.4gQjN7DL.js691B
📜injectedModules.5z7bU482.js28B
📜preload-helper.H-X7TzZu.js1KB
📜root.cw4XsmNe.js317KBlarge
📁svg6KB
🖼chatgpt-logo.chunk.svg6KB
📁src15KB
📁pages15KB
📁background10KB
📜index.js10KB
📁contentInjected1KB
📜index.js1KB
📁contentUI1KB
📜index.js1KB
📁options1KB
🌐index.html406B
📜index.js964B
📁popup
🌐index.html400B
📜index.js488B
🖼128.png27KB
🖼16.png2KB
🖼32.png4KB
🖼34.png4KB
🖼48.png6KB
🖼96.png18KB
🖼favicon.ico15KB
🖼google.svg742B
{}manifest.json2KB
🖼windchat.png3KB

What This Extension Does

This extension helps users delete multiple ChatGPT conversation histories at once.

Permissions

  • storageexpected: Lets the extension save and retrieve data locally on your computer, like settings or history records. A user might care because it could store sensitive information about their browsing habits.
  • activeTabexpected: Allows the extension to see and interact with the currently active browser tab, including its URL and content. This is needed for interacting with ChatGPT pages but could be misused if not properly scoped.

Your Data

The extension may send data to external servers when deleting conversations, particularly through a domain called batch-delete-history-api.windchat.link. It could transmit information about your chats or usage patterns.

Code Findings

Use of eval() functionHigh

The extension uses a JavaScript command called 'eval' that can run code from strings. This is risky because it could allow attackers to inject harmful commands if the string comes from an untrusted source.

💡 Commonly used in development tools or debugging utilities where developers need dynamic evaluation, but should be avoided unless strictly necessary and securely implemented.

Trustworthiness

  • Developer: No developer name is listed in the metadata. This lack of identification raises concerns about accountability and trustworthiness.
  • Privacy Policy: No privacy policy was found, making it unclear how data collected by this extension is handled or whether any personal information is transmitted.
  • Install Base: Installed by 2,000 users as of the latest update, suggesting moderate adoption but limited maintenance visibility.
Bottom Line

This extension appears consistent with its purpose, but the presence of eval() usage means users should exercise caution when installing it. Ensure you trust the developer before enabling.

Extension Overview

This extension helps users delete multiple ChatGPT conversation histories at once.

Permissions

  • storageexpected: Exposes access to Chrome's chrome.storage API which allows reading/writing of persistent key-value pairs in local storage. An attacker with control over this extension could potentially read stored data such as conversation IDs or session tokens if they were saved there.
  • activeTabexpected: Grants access to chrome.tabs API methods like query() and executeScript(), enabling interaction with the current page's DOM or execution of scripts in context. If compromised, an attacker can manipulate content on active tabs including injecting malicious code into ChatGPT pages.

Data Exposure (Technical)

Communicates with the following domains: chatgpt.com (for injection), img.windchat.link (image hosting), github.com (possibly for updates), batch-delete-history-api.windchat.link (primary API endpoint), vitejs.dev, reactjs.org, lodash.com, underscorejs.org, npms.io, arkose-api.windchat.link. Data transmission includes potentially sensitive information like conversation IDs or metadata related to chat history deletion. No explicit encryption is mentioned; HTTP requests are made without clear indication of TLS enforcement.

Code Findings

Use of eval() functionHigh

Detected usage of eval() in content script or background logic, which allows dynamic execution of arbitrary JavaScript code based on runtime inputs. If input sources are not properly sanitized (e.g., fetched from remote APIs), this creates a potential vector for code injection attacks that could lead to full compromise of the extension environment.

💡 Commonly used in development tools or debugging utilities where developers need dynamic evaluation, but should be avoided unless strictly necessary and securely implemented.

Code Analysis

  • Obfuscation: Standard minification observed; no heavy obfuscation techniques like control flow flattening or string encoding detected.
  • Content Security Policy: Content Security Policy is not set in the manifest, meaning there are no restrictions on inline scripts or external resource loading. This increases risk of XSS and code injection vulnerabilities if content scripts interact with untrusted data.
  • Architecture: Uses Manifest V3 architecture with background service worker and content script injection into ChatGPT domains (chatgpt.com, chat.openai.com, claude.ai/new). The extension does not appear to use MV2 features or manifest anomalies.

Transparency

  • Developer: No developer name is listed in the metadata. This lack of identification raises concerns about accountability and trustworthiness.
  • Privacy Policy: No privacy policy was found, making it unclear how data collected by this extension is handled or whether any personal information is transmitted.
  • Code Visibility: Code appears to be bundled/minified with no public source code available for independent review. This limits transparency and auditability.
  • Install Base: Installed by 2,000 users as of the latest update, suggesting moderate adoption but limited maintenance visibility.
Researcher Assessment

The use of eval() in a browser extension context presents a high-severity risk due to potential for remote code execution if input is not strictly controlled. The lack of CSP and absence of a privacy policy further reduce confidence in data handling practices. Researchers should manually inspect the source code for sanitization logic around eval() usage, verify network traffic patterns against declared permissions, and confirm whether any sensitive data is being sent over insecure channels.

Similar Extensions

More in Productivity/tools →
Easy-to-use PDF tools to view, edit, convert, fill, e-sign PDF files, and more in your browser.
Productivity/tools AI

Zotero Connector

7M+ users
Save references to Zotero from your web browser
Productivity/tools
Browsec VPN is a Chrome VPN extension that protects your IP from Internet threats and lets you browse privately for free…
Productivity/tools
The ultimate AI translator for web, files, ebooks, academic papers, images, and text
Productivity/tools AI