Keywords Serp Clustering
🔍 Security Report Available View on Chrome Web StoreChrome will indicate if you already have this installed.
Overview
✨ Version 1.2 Updates:
- UI Updates: Enhanced user interface for a better user experience
- Fullscreen mode
Unlock Search Intent with SERP Clustering 🔍
Tired of guessing keyword relationships? Cluster by SERP automatically groups your keywords based on the similarity of their Google Search Engine Results Pages (SERPs), revealing hidden connections and true search intent.
Powered by the ValueSERP API, this extension fetches the top 10 organic results for each keyword you provide and intelligently clusters terms that share similar ranking pages.
Why Use Cluster by SERP?
🎯 Identify Shared Search Intent: Understand which keywords users treat similarly in search. Keywords clustered together likely target the same underlying need.
✍️ Optimize Content Strategy: Stop creating redundant pages! Target entire keyword clusters with single, comprehensive pieces of content that satisfy the shared intent.
⚔️ Avoid Keyword Cannibalization: Prevent your own pages from competing against each other for the same SERP rankings.
🧹 Streamline Keyword Research: Quickly organize large keyword lists into actionable groups.
Key Features:
📋 Easy Keyword Input: Paste keywords directly (one per line) or copy/paste from Excel/CSV.
🤖 Automatic Clustering: Simply click "Cluster by SERP" and let the extension do the heavy lifting, with clear progress updates .
👀 Clear Results: View keywords organized by cluster in an easy-to-read, searchable, and sortable table.
📈 Insightful Dashboard: Get a quick overview of your analysis (total keywords, clusters, min/max size).
🔎 Filtering & Sorting: Easily navigate your results by searching keywords or filtering by specific clusters.
💾 Flexible Export: Export your clustered data to CSV, JSON, or Excel (XLSX) for further analysis or reporting.
🔑 Requires ValueSERP API Key: Get started by adding your API key in the settings .
How it Works: ⚙️
Add your ValueSERP API key on the settings page.
Paste or import your list of keywords into the extension popup.
Click "Cluster by SERP".
Analyze the generated clusters and export your results.
Take control of your keyword strategy and build content that truly resonates with search intent. Install Cluster by SERP today!
Tags
Privacy Practices
Security Analysis — Keywords Serp Clustering
Permissions
Code Patterns Detected
External Connections
Package Contents 17 files · 1.1MB
What This Extension Does
Keywords Serp Clustering is a productivity tool designed to help SEO professionals organize keyword lists by analyzing the similarity of Google Search results. It solves the problem of identifying shared search intent and avoiding keyword cannibalization by fetching SERP data via an external API. The extension is intended for content strategists and marketers who need to streamline their keyword research workflows.
Permissions Explained
- storageexpected: This permission allows the extension to save your settings, API keys, and analysis results locally within your browser so they persist between sessions.
Technical: Accesses chrome.storage.local and chrome.storage.sync. This is a standard requirement for any extension that needs to remember user preferences or cached data without sending it to a remote server immediately. - https://api.valueserp.com/*expected: This permission allows the extension to communicate with ValueSERP's servers to fetch search engine result data for your keywords.
Technical: Establishes outbound HTTPS connections to a specific third-party API domain. The extension sends keyword queries and receives JSON responses containing SERP snippets. This is necessary for the core functionality but requires trust in the third-party provider. - https://data.valueserp.com/*expected: This permission enables the extension to access additional data endpoints provided by ValueSERP for clustering analysis.
Technical: Establishes outbound HTTPS connections to a secondary third-party domain. Similar to the API endpoint, this is required for the specific data processing logic described in the developer's documentation.
Your Data
The extension accesses your local browser storage to save configuration and sends keyword lists and search queries exclusively to ValueSERP's servers (api.valueserp.com and data.valueserp.com) over encrypted HTTPS connections. It does not appear to send data to arbitrary third parties based on the network log.
Technical Details
Code Findings
The extension uses a method that could potentially execute malicious code if it displays untrusted content directly into the webpage without proper sanitization.
Technical: Code pattern: 'element.innerHTML = userInput'. This is flagged as a medium risk because if the extension were to fetch and render arbitrary HTML from an external source (like the SERP results) without stripping scripts, it could lead to Cross-Site Scripting (XSS). However, since the API returns structured data intended for display, this is often a false positive unless the developer concatenates user input directly into the DOM.
💡 Commonly used in legitimate extensions to dynamically update UI elements with fetched data. The risk is mitigated if the extension only renders sanitized text or uses specific rendering libraries that strip dangerous tags.
The security analysis detected code patterns associated with capturing keystrokes. This is a severe privacy risk as it could theoretically record everything you type in any website.
Technical: Code pattern: Event listeners attached to 'keydown', 'keypress', or 'input' events on the document body or specific forms, potentially forwarding data to an external endpoint. The network log does not show a dedicated keylogger server, but the presence of this code pattern is critical.
💡 Rarely used legitimately in productivity tools unless specifically designed for password managers (which use OS-level APIs) or accessibility tools. In a keyword clustering tool, capturing keystrokes on arbitrary sites provides no functional value and contradicts the principle of least privilege.
The extension monitors form inputs, which could mean it is reading data you type into search boxes or input fields on websites.
Technical: Code pattern: Event listeners attached to 'input' or 'change' events on form elements. This allows the extension to read the value of text fields before they are submitted.
💡 Used legitimately to auto-fill forms, detect search queries for clustering, or copy text from input boxes. However, combined with the keystroke finding, this increases the surface area for data leakage if the event handlers are not strictly scoped to the extension's own UI elements.
The code uses techniques to hide its logic, making it harder for users to inspect and verify what the extension is actually doing.
Technical: Code pattern: Use of 'charCodeAt' in loops or string manipulation that suggests dynamic code generation or obfuscation. This often accompanies malware or adware to evade static analysis tools.
💡 Sometimes used by developers to minify code, but aggressive obfuscation is a red flag for security analysts as it hinders transparency and debugging.
The extension does not enforce strict security rules on which scripts can run, leaving it more vulnerable to code injection attacks.
Technical: Manifest V3 extensions should ideally define a CSP in the manifest.json. The absence of this header means the browser applies default permissive policies, allowing any script loaded by the extension to execute.
💡 Many simple extensions omit this for simplicity, but it is a best practice for security-hardened applications.
While the core functionality of clustering keywords via an API appears legitimate and the permissions align with the stated purpose, the extension presents significant security concerns. The detection of critical-level keystroke capture capabilities and medium-level form monitoring contradicts the expected behavior of a simple productivity tool. Additionally, the use of obfuscation techniques and missing Content Security Policy reduces transparency. Users should exercise extreme caution; it is recommended to avoid installing this extension until the developer provides a clear explanation for the keystroke capture code and removes these high-risk behaviors.