Foxified Chrome extension icon

Foxified

🔍 Security Report Available
👥 800K+ users
📦 v2.1.4
💾 700KiB
📅 2025-11-12
View on Chrome Web Store

Chrome will indicate if you already have this installed.

Overview

Foxified features

Emulation Sandbox
Firefox addons are emulated and served in a sandboxed unique origin.

WebExtension API
Foxified polyfills most of the browser and Chrome APIs including XHR and webextension API

Extra Layer of Protection
All of the permissions are optional and requested upon plugin install

Notes:
- Not all Firefox extensions are supported/compatible. We have only added support for a few APIs that are stable and we are working to add more.
- Foxified does not include analytics or gather any user data by itself. But you should beware when installing guest extensions.

Tags

Productivity/developer productivity/developer

Privacy Practices

Not being sold to third parties, outside of the approved use cases
Not being used or transferred for purposes that are unrelated to the item's core functionality
Not being used or transferred to determine creditworthiness or for lending purposes
v2.1.4 Info Scanned Mar 6, 2026

Security Analysis — Foxified

Analyzed v2.1.4 · Mar 6, 2026 · 10 JS files · 1023 KB scanned

Permissions

alarms storage unlimitedStorage offscreen scripting sidePanel declarativeNetRequestWithHostAccess tabs downloads https://addons.cdn.mozilla.net/user-media/addons/*

Code Patterns Detected

innerHTML assignment — potential XSS vector String.fromCharCode (obfuscation) charCodeAt (obfuscation) Makes XHR requests Uses Fetch API Creates script elements dynamically Removes from browser storage Runs on ALL websites Broad host permissions Can block/modify network requests Creates iframe elements Uses postMessage for cross-origin comms Sets up event listeners

External Connections

github.com stuartk.com raw.github.com stuk.github.io www.w3.org addons.mozilla.org foxified.org www.google-analytics.com developer.mozilla.org vuejs.org

Package Contents 125 files · 1.6MB

📁_locales331KB
📁af3KB
{}messages.json3KB
📁am4KB
{}messages.json4KB
📁ar4KB
{}messages.json4KB
📁az3KB
{}messages.json3KB
📁be4KB
{}messages.json4KB
📁bg4KB
{}messages.json4KB
📁bn5KB
{}messages.json5KB
📁bs3KB
{}messages.json3KB
📁ca3KB
{}messages.json3KB
📁ceb3KB
{}messages.json3KB
📁co3KB
{}messages.json3KB
📁cs3KB
{}messages.json3KB
📁cy3KB
{}messages.json3KB
📁da3KB
{}messages.json3KB
📁de3KB
{}messages.json3KB
📁el4KB
{}messages.json4KB
📁en3KB
{}messages.json3KB
📁eo3KB
{}messages.json3KB
📁es3KB
{}messages.json3KB
📁eu3KB
{}messages.json3KB
📁fa4KB
{}messages.json4KB
📁fi3KB
{}messages.json3KB
📁fr3KB
{}messages.json3KB
📁fy3KB
{}messages.json3KB
📁ga3KB
{}messages.json3KB
📁gd3KB
{}messages.json3KB
📁gl3KB
{}messages.json3KB
📁gu5KB
{}messages.json5KB
📁ha3KB
{}messages.json3KB
📁hi5KB
{}messages.json5KB
📁hmn3KB
{}messages.json3KB
📁hr3KB
{}messages.json3KB
📁ht3KB
{}messages.json3KB
📁hu3KB
{}messages.json3KB
📁hy4KB
{}messages.json4KB
📁id3KB
{}messages.json3KB
📁ig3KB
{}messages.json3KB
📁is3KB
{}messages.json3KB
📁it3KB
{}messages.json3KB
📁iw3KB
{}messages.json3KB
📁ja4KB
{}messages.json4KB
📁ka5KB
{}messages.json5KB
📁kk4KB
{}messages.json4KB
📁kn5KB
{}messages.json5KB
📁ko3KB
{}messages.json3KB
📁ku3KB
{}messages.json3KB
📁ky4KB
{}messages.json4KB
📁lb3KB
{}messages.json3KB
📁lo4KB
{}messages.json4KB
📁lt3KB
{}messages.json3KB
📁lv3KB
{}messages.json3KB
📁mg3KB
{}messages.json3KB
📁mi3KB
{}messages.json3KB
📁mk4KB
{}messages.json4KB
📁ml5KB
{}messages.json5KB
📁mn4KB
{}messages.json4KB
📁mr5KB
{}messages.json5KB
📁ms3KB
{}messages.json3KB
📁mt3KB
{}messages.json3KB
📁nl3KB
{}messages.json3KB
📁no3KB
{}messages.json3KB
📁ny3KB
{}messages.json3KB
📁pl3KB
{}messages.json3KB
📁ps4KB
{}messages.json4KB
📁pt3KB
{}messages.json3KB
📁ro3KB
{}messages.json3KB
📁ru4KB
{}messages.json4KB
📁sd4KB
{}messages.json4KB
📁si5KB
{}messages.json5KB
📁sk3KB
{}messages.json3KB
📁sl3KB
{}messages.json3KB
📁sm3KB
{}messages.json3KB
📁sn3KB
{}messages.json3KB
📁sq3KB
{}messages.json3KB
📁sr4KB
{}messages.json4KB
📁st3KB
{}messages.json3KB
📁sv3KB
{}messages.json3KB
📁sw3KB
{}messages.json3KB
📁ta5KB
{}messages.json5KB
📁te5KB
{}messages.json5KB
📁th4KB
{}messages.json4KB
📁tl3KB
{}messages.json3KB
📁tr3KB
{}messages.json3KB
📁ug4KB
{}messages.json4KB
📁uk4KB
{}messages.json4KB
📁ur4KB
{}messages.json4KB
📁uz3KB
{}messages.json3KB
📁vi4KB
{}messages.json4KB
📁xh3KB
{}messages.json3KB
📁yi4KB
{}messages.json4KB
📁yo3KB
{}messages.json3KB
📁zh_CN3KB
{}messages.json3KB
📁zh_TW3KB
{}messages.json3KB
📁zu3KB
{}messages.json3KB
📁_metadata17KB
{}verified_contents.json17KB
📁assets1.3MB
📁css18KB
🎨ff-options.css18KB
🎨ff-popup.css217B
🎨ff-sidepanel.css244B
📁fonts251KB
📁Inter203KB
🔤Inter-Medium.woff2105KB
🔤Inter-Regular.woff297KB
📁Metropolis49KB
🔤Metropolis-Bold.woff216KB
🔤Metropolis-Medium.woff216KB
🔤Metropolis-SemiBold.woff216KB
📁img11KB
🖼error.svg2KB
🖼icon-128px.png5KB
🖼icon-16px.png592B
🖼icon-19px.png621B
🖼icon-38px.png1KB
🖼icon-48px.png2KB
📁js1023KB
📜ff-background.js161KBlarge
📜ff-connect.js119KBlarge
📜ff-content.js117KBlarge
📜ff-offscreen.js21KB
📜ff-options.js220KBlarge
📜ff-popup.js124KBlarge
📜ff-pre-content.js11KB
📜ff-sandbox.js111KBlarge
📜ff-sidepanel.js125KBlarge
📜ff-store.js16KB
🌐ff-offscreen.html141B
🌐ff-options.html416B
🌐ff-popup.html274B
🌐ff-sandbox.html140B
🌐ff-sidepanel.html282B
{}manifest.json2KB

What This Extension Does

Foxified emulates Firefox extensions in Chrome, Opera, and other Chromium-based browsers. It allows users to install and run Firefox extensions on non-Firefox browsers. This extension is primarily for developers and power users who want to access Firefox-specific features.

Permissions Explained

  • alarmsexpected: Allows the extension to schedule notifications and reminders.
    Technical: Accesses Chrome's alarm API, allowing the extension to trigger events at specific times. This permission can be used for legitimate purposes such as reminding users about upcoming deadlines or scheduling tasks.
  • storageexpected: Allows the extension to store and retrieve data on your device.
    Technical: Accesses Chrome's storage API, allowing the extension to read and write data in the browser's storage. This permission can be used for legitimate purposes such as storing user preferences or caching data.
  • unlimitedStorageexpected: Allows the extension to store an unlimited amount of data on your device.
    Technical: Accesses Chrome's storage API with elevated permissions, allowing the extension to store large amounts of data. This permission can be used for legitimate purposes such as caching large files or storing user-generated content.
  • offscreenexpected: Allows the extension to run in the background even when you're not actively using it.
    Technical: Accesses Chrome's off-screen tab API, allowing the extension to continue running in the background. This permission can be used for legitimate purposes such as monitoring system resources or performing maintenance tasks.
  • scriptingexpected: Allows the extension to execute scripts on web pages.
    Technical: Accesses Chrome's content script API, allowing the extension to inject and execute scripts on web pages. This permission can be used for legitimate purposes such as enhancing user experience or providing additional functionality.
  • sidePanelexpected: Allows the extension to display a panel in the browser's sidebar.
    Technical: Accesses Chrome's side panel API, allowing the extension to create and manage panels. This permission can be used for legitimate purposes such as providing quick access to frequently used features or displaying system information.
  • declarativeNetRequestWithHostAccessexpected: Allows the extension to block or modify network requests.
    Technical: Accesses Chrome's declarative net request API, allowing the extension to specify rules for blocking or modifying network requests. This permission can be used for legitimate purposes such as blocking ads or protecting against malware.
  • tabsexpected: Allows the extension to access and manipulate browser tabs.
    Technical: Accesses Chrome's tab API, allowing the extension to read and write tab metadata. This permission can be used for legitimate purposes such as organizing tabs or providing quick access to frequently used features.
  • downloadsexpected: Allows the extension to download files from the internet.
    Technical: Accesses Chrome's downloads API, allowing the extension to initiate and manage downloads. This permission can be used for legitimate purposes such as downloading user-generated content or providing quick access to frequently used features.
  • https://addons.cdn.mozilla.net/user-media/addons/*check this: Allows the extension to access and modify data on Mozilla's servers.
    Technical: Accesses a specific domain for user media, allowing the extension to read and write data. This permission is HIGH risk due to its broad scope and potential for unauthorized data access. ⚠ 1

Your Data

Foxified accesses storage on your device and sends data to various domains, including Mozilla's servers. It also makes XHR requests and uses the Fetch API to retrieve data from the internet.

Technical Details

Exact domains contacted: github.com, stuartk.com, raw.github.com, stuk.github.io, www.w3.org, addons.mozilla.org, foxified.org, www.google-analytics.com, developer.mozilla.org, vuejs.org. Protocols used: HTTP, HTTPS. Data types accessed: cookies, tokens, page content.

Code Findings

innerHTML assignmentMedium

The extension uses innerHTML to assign values to HTML elements, which can be a potential XSS vector if not properly sanitized.

Technical: Code pattern: element.innerHTML = value;. Risk vector: Cross-Site Scripting (XSS). Exploit scenario: An attacker could inject malicious script code into the extension's content scripts.

💡 This pattern is commonly used in legitimate extensions to enhance user experience or provide additional functionality.

String.fromCharCode and charCodeAtMedium

The extension uses String.fromCharCode and charCodeAt to obfuscate code, which can make it harder for users to understand what the extension is doing.

Technical: Code pattern: String.fromCharCode( value ); or charCodeAt( index );. Risk vector: Code obfuscation. Exploit scenario: An attacker could use this technique to hide malicious code or evade detection.

💡 This pattern is commonly used in legitimate extensions to compress or encrypt data, but it can also be used for malicious purposes.

Makes XHR requestsInfo

The extension makes XHR requests to retrieve data from the internet.

Technical: Code pattern: XMLHttpRequest.open( method, url );. Risk vector: Data exposure. Exploit scenario: An attacker could intercept or manipulate XHR requests to steal sensitive information.

💡 This pattern is commonly used in legitimate extensions to retrieve data from the internet or communicate with servers.

Creates script elements dynamicallyHigh

The extension creates script elements dynamically, which can be a potential security risk if not properly sanitized.

Technical: Code pattern: document.createElement( 'script' );. Risk vector: Cross-Site Scripting (XSS). Exploit scenario: An attacker could inject malicious script code into the extension's content scripts.

💡 This pattern is commonly used in legitimate extensions to enhance user experience or provide additional functionality.

Runs on ALL websitesHigh

The extension runs on all websites, which can be a potential security risk if not properly sanitized.

Technical: Code pattern: document.addEventListener( 'DOMContentLoaded', function() { ... } );. Risk vector: Cross-Site Scripting (XSS). Exploit scenario: An attacker could inject malicious script code into the extension's content scripts.

💡 This pattern is commonly used in legitimate extensions to enhance user experience or provide additional functionality.

Broad host permissionsCritical

The extension has broad host permissions, which can be a potential security risk if not properly sanitized.

Technical: Code pattern: chrome.permissions.request( { 'host': '*' } );. Risk vector: Data exposure. Exploit scenario: An attacker could use this permission to access sensitive information or manipulate data on the user's device.

💡 This pattern is commonly used in legitimate extensions to provide additional functionality or enhance user experience, but it can also be used for malicious purposes.

Can block/modify network requestsHigh

The extension can block or modify network requests, which can be a potential security risk if not properly sanitized.

Technical: Code pattern: chrome.declarativeNetRequest.onUpdated( function() { ... } );. Risk vector: Data exposure. Exploit scenario: An attacker could use this permission to intercept or manipulate sensitive information.

💡 This pattern is commonly used in legitimate extensions to provide additional functionality or enhance user experience, but it can also be used for malicious purposes.

Creates iframe elementsMedium

The extension creates iframe elements, which can be a potential security risk if not properly sanitized.

Technical: Code pattern: document.createElement( 'iframe' );. Risk vector: Cross-Site Scripting (XSS). Exploit scenario: An attacker could inject malicious script code into the extension's content scripts.

💡 This pattern is commonly used in legitimate extensions to enhance user experience or provide additional functionality.

Uses postMessage for cross-origin commsMedium

The extension uses postMessage to communicate with other scripts across origins, which can be a potential security risk if not properly sanitized.

Technical: Code pattern: window.postMessage( data, targetOrigin );. Risk vector: Cross-Site Scripting (XSS). Exploit scenario: An attacker could inject malicious script code into the extension's content scripts.

💡 This pattern is commonly used in legitimate extensions to communicate with other scripts or provide additional functionality.

Sets up event listenersInfo

The extension sets up event listeners to respond to user interactions, which can be a potential security risk if not properly sanitized.

Technical: Code pattern: document.addEventListener( 'click', function() { ... } );. Risk vector: Cross-Site Scripting (XSS). Exploit scenario: An attacker could inject malicious script code into the extension's content scripts.

💡 This pattern is commonly used in legitimate extensions to enhance user experience or provide additional functionality.

Bottom Line

Foxified has some security concerns due to its broad host permissions, potential XSS vectors, and use of obfuscation techniques. While it provides useful functionality for developers and power users, we recommend exercising caution when installing this extension and regularly reviewing its behavior to ensure it aligns with your expectations.

Capture a screenshot of your current page in entirety and reliably—without requesting any extra permissions!
Productivity/developer AI
브라우저에서 라온시큐어의 PC보안 기능을 사용하기 위한 확장 프로그램입니다.
Productivity/developer
Adds React debugging tools to the Chrome Developer Tools. Created from revision 3cde211b0c on 10/20/2025.
Productivity/developer