Microsoft Bing Homepage S
🔍 Security Report Available View on Chrome Web StoreChrome will indicate if you already have this installed.
Overview
Set your homepage to Bing.com to check out the latest news, entertainment and sports each day and turn your searching into doing with Microsoft Bing.
Search the web faster with the quick search feature. It’s easy—Go to any website and highlight the text you want to look up. With just one click, you’ll see your search results on Microsoft Bing.
Tags
Privacy Practices
Security Analysis — Microsoft Bing Homepage S
Permissions
Code Patterns Detected
External Connections
Package Contents 129 files · 1.6MB
What This Extension Does
This extension, Microsoft Bing Homepage S, sets your default homepage to Bing.com and allows quick searching from any website. It's designed for users who want a convenient search experience. However, it has some concerning behavior that may impact user privacy and security.
Permissions Explained
- cookiescheck this: This permission lets the extension access cookies stored on your device, which can be used to track browsing history or store sensitive data.
Technical: The extension has access to browser cookies via thetabsAPI, allowing it to read and modify cookie values. This could potentially lead to unauthorized data exposure if compromised. ⚠ 1 - declarativeNetRequestexpected: This permission allows the extension to block or modify network requests, which can be used for legitimate purposes like ad-blocking or security enhancements.
Technical: ThedeclarativeNetRequestAPI grants the extension control over network traffic, enabling it to intercept and manipulate HTTP requests. This could be misused for malicious activities if exploited. - tabsexpected: This permission lets the extension access information about your browsing sessions, including open tabs and their contents.
Technical: ThetabsAPI provides the extension with access to tab metadata, such as URLs, titles, and content. This could be used for legitimate purposes like providing search suggestions or tracking browsing history. - alarmsexpected: This permission allows the extension to schedule background tasks, which can be used for legitimate purposes like updating settings or sending notifications.
Technical: ThealarmsAPI enables the extension to create scheduled events that run in the background. While this is generally safe, it could potentially be exploited for malicious activities if compromised. - storageexpected: This permission lets the extension store and retrieve data locally on your device, which can be used to cache search results or store user preferences.
Technical: ThestorageAPI grants the extension access to local storage mechanisms like Chrome's Local Storage. This could potentially lead to unauthorized data exposure if compromised. - contextMenusexpected: This permission allows the extension to create custom context menus, which can be used for legitimate purposes like providing quick access to search functions.
Technical: ThecontextMenusAPI enables the extension to inject custom menu items into the browser's context menu. While this is generally safe, it could potentially be exploited for malicious activities if compromised. - notificationsexpected: This permission lets the extension display notifications to your device, which can be used for legitimate purposes like alerting you to new search results or updates.
Technical: ThenotificationsAPI grants the extension access to display notifications on your device. While this is generally safe, it could potentially be exploited for malicious activities if compromised. - scriptingexpected: This permission allows the extension to execute scripts in the browser's context, which can be used for legitimate purposes like providing search suggestions or tracking browsing history.
Technical: ThescriptingAPI enables the extension to inject scripts into web pages. While this is generally safe, it could potentially lead to unauthorized data exposure if compromised. - https://*/*check this: This permission lets the extension access all HTTPS websites, which can be used for legitimate purposes like providing search results or tracking browsing history.
Technical: Thehttps://*/*permission grants the extension access to all HTTPS domains. This is a critical risk due to the potential for unauthorized data exposure if compromised. ⚠ 1 - http://*/*check this: This permission lets the extension access all HTTP websites, which can be used for legitimate purposes like providing search results or tracking browsing history.
Technical: Thehttp://*/*permission grants the extension access to all HTTP domains. This is a critical risk due to the potential for unauthorized data exposure if compromised. ⚠ 1
Your Data
This extension accesses cookies stored on your device and sends data to various Microsoft-owned domains, including Bing.com, go.microsoft.com, and browserdefaults.microsoft.com. It also makes XHR requests and uses the Fetch API.
Technical Details
tabs API.Code Findings
This extension loads external scripts from a service worker, which can be used for legitimate purposes like providing search suggestions or tracking browsing history.
Technical: The extension uses the serviceWorker API to load external scripts. This is a common pattern in legitimate extensions and does not pose an immediate risk.
💡 1
This extension uses innerHTML assignment, which can be used to inject malicious scripts into web pages. However, this is a common pattern in legitimate extensions and does not pose an immediate risk.
Technical: The extension uses the innerHTML property to assign values to HTML elements. While this can potentially lead to XSS attacks if exploited, it is a common pattern in legitimate extensions and does not pose an immediate risk.
💡 1
This extension uses String.fromCharCode to obfuscate code, which can make it harder for users to understand what the extension is doing.
Technical: The extension uses String.fromCharCode to encode strings. While this can be used for legitimate purposes like encoding sensitive data, it can also be used to obfuscate malicious activities if exploited.
💡 1
This extension makes XHR requests to various Microsoft-owned domains, which can be used for legitimate purposes like providing search results or tracking browsing history.
Technical: The extension uses the XMLHttpRequest API to make requests to various domains. This is a common pattern in legitimate extensions and does not pose an immediate risk.
💡 1
This extension uses the Fetch API to make requests to various Microsoft-owned domains, which can be used for legitimate purposes like providing search results or tracking browsing history.
Technical: The extension uses the fetch function to make requests. This is a common pattern in legitimate extensions and does not pose an immediate risk.
💡 1
This extension sends data to Microsoft-owned domains using the Beacon API, which can be used for legitimate purposes like tracking browsing history or providing search suggestions.
Technical: The extension uses the beacon function to send data. While this can potentially lead to unauthorized data exposure if compromised, it is a common pattern in legitimate extensions and does not pose an immediate risk.
💡 1
This extension creates script elements dynamically, which can be used for malicious activities like injecting malware or tracking browsing history.
Technical: The extension uses the document.createElement function to create script elements. While this is a common pattern in legitimate extensions, it can also be used to inject malicious scripts if exploited.
💡 1
This extension accesses browser cookies, which can be used for malicious activities like tracking browsing history or injecting malware.
Technical: The extension uses the tabs API to access cookie values. While this is a common pattern in legitimate extensions, it can also be used to inject malicious scripts if exploited.
💡 1
This extension has the ability to block or modify network requests, which can be used for malicious activities like injecting malware or tracking browsing history.
Technical: The extension uses the declarativeNetRequest API to intercept and manipulate HTTP requests. While this is a common pattern in legitimate extensions, it can also be used to inject malicious scripts if exploited.
💡 1
This extension has potential hardcoded secrets that could be used for malicious activities like injecting malware or tracking browsing history.
Technical: The extension uses a hardcoded secret to authenticate requests. While this is a common pattern in legitimate extensions, it can also be used to inject malicious scripts if exploited.
💡 1
This extension creates iframe elements dynamically, which can be used for legitimate purposes like providing search suggestions or tracking browsing history.
Technical: The extension uses the document.createElement function to create iframe elements. While this is a common pattern in legitimate extensions and does not pose an immediate risk, it can potentially lead to unauthorized data exposure if compromised.
💡 1
This extension uses the postMessage function to communicate with other domains, which can be used for legitimate purposes like providing search suggestions or tracking browsing history.
Technical: The extension uses the postMessage function to send messages across origins. While this is a common pattern in legitimate extensions and does not pose an immediate risk, it can potentially lead to unauthorized data exposure if compromised.
💡 1
This extension sets up event listeners to track user interactions, which can be used for legitimate purposes like providing search suggestions or tracking browsing history.
Technical: The extension uses the addEventListener function to set up event listeners. While this is a common pattern in legitimate extensions and does not pose an immediate risk, it can potentially lead to unauthorized data exposure if compromised.
💡 1
This extension has some concerning behavior that may impact user privacy and security. While it provides a convenient search experience, its access to cookies, ability to block/modify network requests, and potential hardcoded secrets raise significant concerns. Users should exercise caution when installing this extension and consider alternative options for their search needs.