Volume Master
🔍 Security Report Available View on Chrome Web StoreChrome will indicate if you already have this installed.
Overview
The simplest and most reliable volume booster
🚀 Features
⭐️ Up to 600 % volume boost
⭐️ Control volume of any tab
⭐️ Fine-grained control: 0 % - 600 %
⭐️ Switch to any tab playing audio with just one click
🚀 Full screen
⭐️ Chrome prevents you from going to a complete full-screen when using any extension manipulating with sound so you can always see the blue rectangle icon in the tab bar (to be aware of audio is being manipulated). There's no way to bypass it and after all it's a good thing that keeps you safe. However you can improve the situation a bit by pressing F11 (on Windows) or Ctr+Cmd+F (on Mac).
🚀 Permissions explained
⭐️ "Read and change all your data on the websites you visit": to be able to connect to and modify AudioContext of any website playing audio and to show list of all tabs playing audio
Completely free and with no ads
Made with ❤️ by Peta Sittek
Tags
Privacy Practices
Security Analysis — Volume Master
Permissions
Code Patterns Detected
External Connections
Package Contents 92 files · 126KB
What This Extension Does
The Volume Master extension claims to boost volume by up to 600% and control audio levels. It's designed for users who want fine-grained control over their browser's audio settings. However, its functionality raises concerns about data exposure and potential risks.
Permissions Explained
- activeTabexpected: This permission allows the extension to access the currently active tab in your browser.
Technical: The extension uses this API to read and modify AudioContext of any website playing audio, which could potentially expose sensitive information or allow unauthorized modifications. - offscreenexpected: This permission enables the extension to access tabs that are not currently visible on your screen.
Technical: The extension uses this API to capture and manipulate audio from off-screen tabs, which could potentially expose sensitive information or allow unauthorized modifications. - tabCapturecheck this: This permission allows the extension to capture screenshots of your browser's tabs.
Technical: The extension uses this API to capture and manipulate audio from any tab, which could potentially expose sensitive information or allow unauthorized modifications. This is a HIGH-risk permission due to its potential for data exposure and unauthorized access. ⚠ 1 - tabsexpected: This permission enables the extension to access and manage your browser's tabs.
Technical: The extension uses this API to read and modify AudioContext of any website playing audio, which could potentially expose sensitive information or allow unauthorized modifications. - storageexpected: This permission allows the extension to store data locally on your device.
Technical: The extension uses this API to store and retrieve sensitive information, such as user preferences and audio settings. This could potentially expose sensitive information if compromised.
Your Data
The Volume Master extension accesses your browser's tabs, including those that are not currently visible on your screen. It also stores data locally on your device and sends requests to the developer's website (www.petasittek.com).
Technical Details
Code Findings
This finding indicates that the extension uses innerHTML assignments in its code, which could potentially lead to cross-site scripting (XSS) attacks.
Technical: The extension's JavaScript files contain innerHTML assignments, which could allow an attacker to inject malicious scripts into the browser. This is a medium-risk finding due to the potential for XSS attacks.
💡 innerHTML assignments are commonly used in legitimate extensions to dynamically update content.
This finding indicates that the extension captures keystrokes, which could potentially expose sensitive information or allow unauthorized access.
Technical: The extension uses the tabCapture API to capture screenshots of your browser's tabs, including any keystrokes entered by the user. This is a critical-risk finding due to the potential for data exposure and unauthorized access.
💡 Keystroke capturing is not typically used in legitimate extensions, as it can be considered an invasion of user privacy.
This finding indicates that the extension monitors form inputs, which could potentially expose sensitive information or allow unauthorized access.
Technical: The extension uses event listeners to monitor form inputs, which could allow an attacker to inject malicious scripts into the browser. This is a medium-risk finding due to the potential for XSS attacks.
💡 Form input monitoring is commonly used in legitimate extensions to validate user input and prevent unauthorized access.
This finding indicates that the extension uses the screen/tab capture API, which could potentially expose sensitive information or allow unauthorized access.
Technical: The extension uses the tabCapture API to capture screenshots of your browser's tabs, including any sensitive information displayed on those tabs. This is a critical-risk finding due to the potential for data exposure and unauthorized access.
💡 Screen/tab capture APIs are not typically used in legitimate extensions, as they can be considered an invasion of user privacy.
This finding indicates that the extension sets up event listeners to monitor user activity.
Technical: The extension uses event listeners to monitor user activity, which could potentially allow an attacker to inject malicious scripts into the browser. However, this is a common practice in legitimate extensions and does not pose a significant risk on its own.
💡 Event listener setup is commonly used in legitimate extensions to respond to user interactions and prevent unauthorized access.
The Volume Master extension raises concerns about data exposure and potential risks due to its use of the tabCapture API, keystroke capturing, and form input monitoring. While it may provide useful functionality for users who want fine-grained control over their browser's audio settings, we recommend exercising caution when installing this extension and closely reviewing its permissions and behavior.