Microsoft Power Automate Chrome extension icon

Microsoft Power Automate

🔍 Security Report Available
👥 10M+ users
📦 v2.61.0.32
💾 601KiB
📅 2025-11-12
View on Chrome Web Store

Chrome will indicate if you already have this installed.

Lets you automate web tasks with Microsoft Power Automate, a powerful extension that enables seamless automation for desktop users running version 2.27 or later of the Power Automate for desktop application. Ideal for individuals and businesses looking to streamline repetitive tasks and workflows, this extension is particularly beneficial for those already familiar with Power Automate's capabilities. By integrating with Power Automate, users can automate web interactions with ease, saving time and increasing productivity.

Overview

Microsoft Power Automate extension

Microsoft Power Automate lets you automate manual processes and tasks on your computer. Install the extension to automate things on the web like scripting, data extraction, testing, filling out forms and more.

The Power Automate recorder utility will convert your steps to a flow. Just browse through your favorite parts of the web application and collect data, fill forms, download files – do all the things you usually do and see a flow getting developed.

This browser extension requires additional software to perform properly. Make sure that you've downloaded and installed Power Automate to your device before continuing.

Note: After a specific date that will be announced officially by the browser group, the browser will no longer support web extensions created by Manifest V2. The specific web extension has embraced the new Manifest V3 and it is compatible with Power Automate version 2.27 or later. In case you desire to install this web extension, please ensure that you have upgraded the Power Automate to a compatible version for automating web scenarios. Learn more here: https://go.microsoft.com/fwlink/?linkid=2211532

By installing this extension, you agree to the Terms at: https://docs.microsoft.com/dynamics365/legal/slt-power-automate-brsr

Tags

Productivity/workflow productivity/workflow

Privacy Practices

Not being sold to third parties, outside of the approved use cases
Not being used or transferred for purposes that are unrelated to the item's core functionality
Not being used or transferred to determine creditworthiness or for lending purposes
v2.61.0.32 Info Scanned Mar 4, 2026

Security Analysis — Microsoft Power Automate

Analyzed v2.61.0.32 · Mar 4, 2026 · 7 JS files · 2970 KB scanned

Permissions

scripting debugger tabs browsingData nativeMessaging webNavigation <all_urls> http://*/* https://*/*

Code Patterns Detected

String.fromCharCode (obfuscation) Debugger API (can inject into tabs) Uses postMessage for cross-origin comms Sets up event listeners

External Connections

github.com sizzlejs.com jquery.com jquery.org js.foundation

Package Contents 59 files · 3MB

📁_locales65KB
📁bg2KB
{}messages.json2KB
📁ca1KB
{}messages.json1KB
📁cs1KB
{}messages.json1KB
📁da1KB
{}messages.json1KB
📁de1KB
{}messages.json1KB
📁el2KB
{}messages.json2KB
📁en1KB
{}messages.json1KB
📁es1KB
{}messages.json1KB
📁et1KB
{}messages.json1KB
📁eu1KB
{}messages.json1KB
📁fi1KB
{}messages.json1KB
📁fr1KB
{}messages.json1KB
📁gl1KB
{}messages.json1KB
📁hi2KB
{}messages.json2KB
📁hr1KB
{}messages.json1KB
📁hu1KB
{}messages.json1KB
📁id1KB
{}messages.json1KB
📁it1KB
{}messages.json1KB
📁ja1KB
{}messages.json1KB
📁kk2KB
{}messages.json2KB
📁ko1KB
{}messages.json1KB
📁lt1KB
{}messages.json1KB
📁lv1KB
{}messages.json1KB
📁ms1KB
{}messages.json1KB
📁nb1KB
{}messages.json1KB
📁nb-NO1KB
{}messages.json1KB
📁nl1KB
{}messages.json1KB
📁nn1KB
{}messages.json1KB
📁no1KB
{}messages.json1KB
📁pl1KB
{}messages.json1KB
📁pt-BR1KB
{}messages.json1KB
📁pt-PT1KB
{}messages.json1KB
📁ro1KB
{}messages.json1KB
📁ru2KB
{}messages.json2KB
📁sk1KB
{}messages.json1KB
📁sl1KB
{}messages.json1KB
📁sr-Cyrl-RS2KB
{}messages.json2KB
📁sr-Latn-RS1KB
{}messages.json1KB
📁sv1KB
{}messages.json1KB
📁th2KB
{}messages.json2KB
📁tr1KB
{}messages.json1KB
📁uk2KB
{}messages.json2KB
📁vi2KB
{}messages.json2KB
📁zh-Hans1KB
{}messages.json1KB
📁zh-Hant1KB
{}messages.json1KB
📁_metadata8KB
{}verified_contents.json8KB
📁scripts2.7MB
📜api.v1.js684KBlarge
📜api.v2.js662KBlarge
📜api.v3.js663KBlarge
📜api.v4.js726KBlarge
📜content.v1.js13KB
📜content.v2.js14KB
🖼PAD-ico_128.png11KB
🖼PAD-ico_32.png1KB
🖼PAD-ico_48.png2KB
🖼PAD-ico_56.png2KB
🖼PAD-ico_64.png3KB
📜background.js209KBlarge
{}manifest.json725B

What This Extension Does

The Microsoft Power Automate extension enables web automation, allowing users to automate manual processes and tasks on their computer. It's designed for productivity and workflow optimization, but requires additional software installation. With over 10 million users, it's a popular choice for those who need to streamline their work.

Permissions Explained

  • <all_urls>check this: This permission allows the extension to access all URLs visited by the user, including sensitive information like login credentials and personal data.
    Technical: The <all_urls> permission grants access to all web pages, including those with sensitive content. This could potentially expose users' browsing history, login credentials, or other personal data if compromised. ⚠ 1
  • nativeMessagingcheck this: This permission enables the extension to communicate with native applications on the user's device.
    Technical: The nativeMessaging API allows extensions to interact with native code, potentially exposing users' system settings or other sensitive information if compromised. ⚠ 1
  • debuggercheck this: This permission allows the extension to inject into tabs and access debugging tools.
    Technical: The debugger API enables extensions to inject code into web pages, potentially allowing for malicious activities like data exfiltration or code injection if compromised. ⚠ 1
  • browsingDatacheck this: This permission allows the extension to access browsing history and other user data.
    Technical: The browsingData API grants access to users' browsing history, including sensitive information like login credentials or personal data. This could potentially expose users' online activities if compromised. ⚠ 1
  • scriptingexpected: This permission allows the extension to run scripts on web pages.
    Technical: The scripting API enables extensions to execute JavaScript code, potentially allowing for malicious activities like data exfiltration or code injection if compromised.
  • tabsexpected: This permission allows the extension to access and manipulate tabs.
    Technical: The tabs API grants access to users' open tabs, potentially exposing sensitive information like login credentials or personal data if compromised.

Your Data

The extension accesses browsing history and other user data through the <all_urls> and browsingData permissions. It also communicates with native applications using the nativeMessaging API. The extension sends data to various domains, including github.com, sizzlejs.com, jquery.com, jquery.org, and js.foundation.

Technical Details

domains
  • github.com
  • sizzlejs.com
  • jquery.com
  • jquery.org
  • js.foundation
protocols
  • http
  • https
encryption_status
Not specified
data_types
  • cookies
  • tokens
  • page content

Code Findings

Obfuscation through String.fromCharCodeMedium

The extension uses obfuscation techniques to make its code harder to understand. This is a common practice in legitimate extensions, but it can also be used for malicious purposes.

Technical: The extension uses the String.fromCharCode function to encode strings, making it difficult to analyze the code without deobfuscation tools.

💡 Legitimate extensions often use obfuscation to protect their intellectual property or make their code harder to reverse-engineer.

Debugger API injectionCritical

The extension injects into tabs using the debugger API, which can potentially allow for malicious activities like data exfiltration or code injection.

Technical: The extension uses the Debugger API to inject code into web pages, allowing it to access and manipulate sensitive information.

💡 Legitimate extensions often use the debugger API to debug their own code or provide debugging tools to users.

Cross-origin communication using postMessageMedium

The extension uses the postMessage function to communicate with other web pages, which can potentially allow for malicious activities like data exfiltration or code injection.

Technical: The extension uses the postMessage function to send and receive messages between web pages, allowing it to access and manipulate sensitive information.

💡 Legitimate extensions often use cross-origin communication to provide features like messaging or data sharing between web pages.

Bottom Line

The Microsoft Power Automate extension has several concerning permissions, including <all_urls>, nativeMessaging, and debugger. While it's a popular choice for productivity and workflow optimization, users should be aware of the potential risks associated with these permissions. We recommend exercising caution when installing this extension and monitoring its behavior closely.

Do more in Google Chrome with Adobe Acrobat PDF tools. View, fill, comment, sign, and try convert and compress tools.
Productivity/workflow
Block ads on YouTube and your favorite sites for free
Productivity/workflow
Remove ads on YouTube and everywhere else you browse.
Productivity/workflow