Seo Meta In 1 Click Chrome extension icon

Seo Meta In 1 Click

🔍 Security Report Available
👥 900K+ users
📦 v2.67
💾 462KiB
📅 2024-08-31
View on Chrome Web Store

Chrome will indicate if you already have this installed.

Blocks unnecessary meta data and main SEO information from cluttering your browser, bringing a clean and organized view to the best SEO tools for webmasters and digital marketers who need quick access to essential metadata. Lets you focus on what matters most - optimizing your website's performance without distractions. Integrates seamlessly with popular SEO extensions, benefiting users who value streamlined workflow and accurate online presence management.

Overview

SEO META in 1 CLICK is a tool that displays all meta tags/data and main seo information clearly. By using this tool, we hope you can better manage and improve your SEO and visibility on Internet

We focus on displaying:
✔ title and its length,
✔ description and its length,
✔ URL (and meta-canonical url too),
✔ meta-robots,
✔ displaying headers in order of their appearance in HTML (H1, H2, H3, H4, H5 and H6),
✔ number of images with and without ALT,
✔ the number of links (internal, unique, ...)
✔ Open Graph and twitter social data
✔ Robots.txt and sitemap.xml
✔ and much more...
(See printscreens)

You can also via ETERNAL TOOLS analyse your site and know how improve it (html, css, Google Rich Snippet, PageSpeed...)

Tags

Productivity/developer seo productivity/developer

Privacy Practices

Not being sold to third parties, outside of the approved use cases
Not being used or transferred for purposes that are unrelated to the item's core functionality
Not being used or transferred to determine creditworthiness or for lending purposes
v2.67 Critical Scanned Feb 25, 2026

Security Analysis — Seo Meta In 1 Click

Analyzed v2.67 · Feb 25, 2026 · 16 JS files · 344 KB scanned

Permissions

activeTab scripting

Code Patterns Detected

eval() used — can execute arbitrary code Function constructor used — dynamic code execution innerHTML assignment — potential XSS vector String.fromCharCode (obfuscation) charCodeAt (obfuscation) Makes XHR requests Creates script elements dynamically Sets up event listeners

External Connections

www.google.com search.google.com www.opensource.org www.gnu.org gtmetrix.com developers.google.com tinysort.sjeiti.com www.metricspot.com plus.google.com www.reactionengine.com benalman.com cdnjs.cloudflare.com +8 more

What This Extension Does

Seo Meta In 1 Click is a browser extension designed to help users analyze the SEO metadata of web pages. It displays key information such as title, description, meta tags, headers, images, links, Open Graph data, and more — all in one click. This tool is intended for website owners, marketers, and developers who want to improve their site's visibility and search engine performance.

Permissions Explained

  • activeTabexpected: This permission allows the extension to access and read information from the currently active web page. It lets the tool view what’s on the page so it can extract SEO data like titles, descriptions, and headers.
    Technical: Grants access to the DOM of the current tab via Chrome's tabs API. If misused, could allow reading or modifying sensitive content from any open webpage.
  • scriptingexpected: This permission allows the extension to inject scripts into web pages and run code on them. It’s needed for extracting SEO data by interacting with page elements directly.
    Technical: Enables use of chrome.scripting.executeScript() which can execute arbitrary JavaScript in a tab's context, potentially allowing access or modification of DOM content if not properly sandboxed.

Your Data

The extension communicates with several external domains to provide additional SEO insights and tools. It sends data about the current page being analyzed, likely including URL and content metadata, but does not appear to collect personal or login information.

Technical Details

Network activity includes requests to: www.google.com, search.google.com, www.opensource.org, www.gnu.org, gtmetrix.com, developers.google.com, tinysort.sjeiti.com, www.metricspot.com, plus.google.com, www.reactionengine.com, benalman.com, cdnjs.cloudflare.com. These are used for fetching external resources or analytics purposes; no indication of data exfiltration or keystroke logging.

Code Findings

Use of eval() and Function constructorHigh

The extension uses code that dynamically evaluates strings as JavaScript, which can be dangerous if those strings come from untrusted sources. This increases the risk of malicious code execution.

Technical: Code contains calls to eval() or the Function constructor — both methods allow runtime interpretation of arbitrary code. If input is not sanitized, attackers could inject harmful scripts into the extension’s behavior.

💡 These patterns are sometimes used in legitimate extensions for dynamic functionality (e.g., parsing configuration files), but they must be carefully implemented to avoid security risks.

Dynamic script element creationHigh

The extension creates new script elements dynamically, which may allow it to inject and run code on web pages. If not controlled properly, this can lead to cross-site scripting (XSS) or unauthorized behavior.

Technical: Scripts are injected using document.createElement('script') followed by assignment of .src or .textContent. This is a common method for injecting third-party libraries but poses risks if external scripts aren't vetted or secured.

💡 Common in extensions that load external libraries (like jQuery, analytics tools) to enhance functionality; however, it must be done securely and with known safe sources.

innerHTML assignmentMedium

The extension assigns HTML content directly into page elements using innerHTML. While useful for displaying data, this can open the door to cross-site scripting if user-provided or untrusted input is rendered without sanitization.

Technical: Code uses element.innerHTML = ... which may introduce XSS vulnerabilities if values are not escaped before insertion — especially when rendering dynamic SEO metadata from web pages.

💡 Standard practice in many extensions for displaying formatted content; however, it requires careful handling of inputs to prevent injection attacks.

String.fromCharCode and charCodeAt obfuscationMedium

The extension uses character-based encoding techniques like String.fromCharCode() and charCodeAt(), which are often used to hide malicious code or make analysis harder. While not inherently harmful, such practices raise suspicion.

Technical: Obfuscated strings via String.fromCharCode() and charCodeAt() suggest that the code may be intentionally obfuscated for security reasons (e.g., hiding malware) or simply as a way to avoid detection by static scanners.

💡 Used in legitimate extensions to protect intellectual property or reduce size, but also commonly seen in malicious software to evade signature-based detection.

Missing Content Security Policy (CSP)Info

The extension does not define a strict Content Security Policy. While this doesn’t directly cause harm, it leaves the extension more vulnerable to certain types of attacks like XSS if scripts are injected.

Technical: No CSP header is set in manifest or response headers, meaning that inline scripts and external resources may be allowed without restrictions — increasing exposure to potential exploitation.

💡 Some extensions do not require strict CSP due to their limited scope; however, it's considered a best practice for security-sensitive code.

XHR requests madeInfo

The extension makes HTTP requests to external domains. These are likely used to fetch additional SEO data or tools, but they don’t appear to involve sensitive user information.

Technical: Uses XMLHttpRequest (XHR) for fetching resources from domains like gtmetrix.com and developers.google.com — typical behavior in extensions that provide performance or analysis features.

💡 Standard practice when an extension needs to retrieve external data, such as page speed metrics or SEO benchmarks.

Event listeners set upInfo

The extension sets up event listeners for user interactions like clicks and keypresses. This is normal behavior to respond to actions within the browser or on web pages.

Technical: Uses addEventListener() for capturing events in content scripts, which allows interaction with UI elements but does not inherently pose a risk unless misused.

💡 Essential functionality in most extensions that interact with users or react to page changes.

Bottom Line

Seo Meta In 1 Click is a productivity tool aimed at helping users analyze SEO data on web pages. While it uses some potentially risky code patterns like eval() and dynamic script injection, these are not necessarily malicious — they may reflect common practices in extension development or obfuscation techniques used to protect code. However, the presence of high-risk behaviors warrants caution. Users should consider whether the benefits outweigh potential security trade-offs, especially given that many features can be replicated using free online tools.

Capture a screenshot of your current page in entirety and reliably—without requesting any extra permissions!
Productivity/developer AI
브라우저에서 라온시큐어의 PC보안 기능을 사용하기 위한 확장 프로그램입니다.
Productivity/developer
Adds React debugging tools to the Chrome Developer Tools. Created from revision 3cde211b0c on 10/20/2025.
Productivity/developer