WPS浏览器助手:文档在线阅读编辑
🔍 Security Report Available View on Chrome Web StoreChrome will indicate if you already have this installed.
Lets you preview and edit popular document formats like PDF, Excel, Word, and PPT online without downloading them, making it a convenient tool for anyone who needs to work with documents on-the-go.
Overview
PDF、Excel、Word、PPT等文档无需下载即可在线预览,还能对文档进行编辑、打印、转换等处理。
Tags
Privacy Practices
Security Analysis — WPS浏览器助手:文档在线阅读编辑
Permissions
Code Patterns Detected
External Connections
Package Contents 233 files · 8.9MB
What This Extension Does
WPS浏览器助手:文档在线阅读编辑 is a browser extension that allows users to preview, edit, print, and convert various document types (PDF, Excel, Word, PPT) without downloading them. It's designed for productivity and convenience, but its functionality raises some security concerns.
Permissions Explained
- webNavigationexpected: This permission allows the extension to monitor and control navigation between web pages.
Technical: The extension can access Chrome's Navigation API, which includes information about the current URL, referrer, and other navigation-related data. This could be used for tracking or redirecting users. - webRequestcheck this: This permission allows the extension to intercept and modify network requests.
Technical: The extension can access Chrome's Web Request API, which includes information about incoming and outgoing HTTP requests. This could be used for injecting malware or modifying user data. ⚠ 1 - downloadsexpected: This permission allows the extension to access and modify download behavior.
Technical: The extension can access Chrome's Downloads API, which includes information about downloaded files. This could be used for tracking or modifying user downloads. - storageexpected: This permission allows the extension to store and retrieve data locally on the user's device.
Technical: The extension can access Chrome's Storage API, which includes information about stored data. This could be used for tracking or storing sensitive user data. - tabsexpected: This permission allows the extension to access and modify tab behavior.
Technical: The extension can access Chrome's Tabs API, which includes information about open tabs. This could be used for tracking or modifying user browsing habits. - cookiescheck this: This permission allows the extension to read and write cookies on behalf of the user.
Technical: The extension can access Chrome's Cookies API, which includes information about stored cookies. This could be used for tracking or modifying user behavior. ⚠ 1 - nativeMessagingcheck this: This permission allows the extension to communicate with native applications on the user's device.
Technical: The extension can access Chrome's Native Messaging API, which includes information about native application communication. This could be used for injecting malware or modifying system behavior. ⚠ 1 - <all_urls>check this: This permission allows the extension to access all URLs on the user's device.
Technical: The extension can access Chrome's All URLs API, which includes information about all visited URLs. This could be used for tracking or modifying user browsing habits. ⚠ 1 - declarativeNetRequestcheck this: This permission allows the extension to block or modify network requests.
Technical: The extension can access Chrome's Declarative Net Request API, which includes information about incoming and outgoing HTTP requests. This could be used for injecting malware or modifying user data. ⚠ 1 - gcmexpected: This permission allows the extension to access Google Cloud Messaging (GCM) services.
Technical: The extension can access Chrome's GCM API, which includes information about device registration and messaging. This could be used for tracking or modifying user behavior. - contextMenusexpected: This permission allows the extension to access context menus on the user's device.
Technical: The extension can access Chrome's Context Menus API, which includes information about menu items. This could be used for tracking or modifying user behavior. - sidePanelexpected: This permission allows the extension to access side panels on the user's device.
Technical: The extension can access Chrome's Side Panels API, which includes information about panel content. This could be used for tracking or modifying user behavior. - historycheck this: This permission allows the extension to access browsing history on the user's device.
Technical: The extension can access Chrome's History API, which includes information about visited URLs. This could be used for tracking or modifying user behavior. ⚠ 1
Your Data
This extension accesses various data on the user's device, including browsing history, cookies, and storage data. It also sends data to several domains, including WPS servers and Google services.
Technical Details
Code Findings
The extension uses eval(), which can execute arbitrary code. This could be used for injecting malware or modifying user data.
Technical: The extension uses eval() in several JavaScript files, including background.js and contentScript.js. This allows the extension to dynamically execute code based on user input.
💡 Eval() is commonly used in legitimate extensions for dynamic code execution.
The extension uses the Function constructor, which can execute arbitrary code. This could be used for injecting malware or modifying user data.
Technical: The extension uses the Function constructor in several JavaScript files, including background.js and contentScript.js. This allows the extension to dynamically create functions based on user input.
💡 The Function constructor is commonly used in legitimate extensions for dynamic code execution.
The extension uses innerHTML assignment, which can be used to inject malicious content. This could be used for XSS attacks or modifying user behavior.
Technical: The extension uses innerHTML assignment in several HTML files, including popup.html and options.html. This allows the extension to dynamically update page content based on user input.
💡 InnerHTML assignment is commonly used in legitimate extensions for dynamic content updates.
The extension uses String.fromCharCode, which can be used to obfuscate code. This could be used for hiding malicious behavior or modifying user data.
Technical: The extension uses String.fromCharCode in several JavaScript files, including background.js and contentScript.js. This allows the extension to dynamically encode strings based on user input.
💡 String.fromCharCode is commonly used in legitimate extensions for encoding strings.
The extension uses charCodeAt, which can be used to obfuscate code. This could be used for hiding malicious behavior or modifying user data.
Technical: The extension uses charCodeAt in several JavaScript files, including background.js and contentScript.js. This allows the extension to dynamically encode characters based on user input.
💡 charCodeAt is commonly used in legitimate extensions for encoding characters.
The extension uses unescape, which can be used to obfuscate code. This could be used for hiding malicious behavior or modifying user data.
Technical: The extension uses unescape in several JavaScript files, including background.js and contentScript.js. This allows the extension to dynamically decode strings based on user input.
💡 unescape is commonly used in legitimate extensions for decoding strings.
The extension captures keystrokes, which could be used to steal sensitive user data or inject malware.
Technical: The extension uses the Keyboard API to capture keystrokes in several JavaScript files, including background.js and contentScript.js. This allows the extension to dynamically monitor keyboard input based on user activity.
💡 Capturing keystrokes is commonly used in legitimate extensions for password management or text input assistance.
The extension can block or modify network requests, which could be used to inject malware or modify user data.
Technical: The extension uses the Declarative Net Request API to block or modify network requests in several JavaScript files, including background.js and contentScript.js. This allows the extension to dynamically intercept and modify HTTP requests based on user input.
💡 Blocking or modifying network requests is commonly used in legitimate extensions for ad-blocking or content filtering.
The extension uses a weak cryptographic algorithm, which could be used to compromise user data or inject malware.
Technical: The extension uses the MD5 hash function in several JavaScript files, including background.js and contentScript.js. This allows the extension to dynamically encrypt data based on user input.
💡 Weak cryptographic algorithms are commonly used in legitimate extensions for password storage or data encryption.
The extension uses postMessage to communicate with other origins, which could be used to inject malware or modify user data.
Technical: The extension uses the postMessage API in several JavaScript files, including background.js and contentScript.js. This allows the extension to dynamically send messages between web pages based on user input.
💡 postMessage is commonly used in legitimate extensions for cross-origin communication or messaging.
The extension sets up event listeners, which could be used to monitor user behavior or inject malware.
Technical: The extension uses the addEventListener API in several JavaScript files, including background.js and contentScript.js. This allows the extension to dynamically attach event handlers based on user input.
💡 Event listeners are commonly used in legitimate extensions for monitoring user activity or responding to events.
This extension raises several security concerns, including the use of eval(), Function constructor, and weak cryptographic algorithms. It also captures keystrokes and can block/modify network requests. While it has legitimate uses for productivity and convenience, users should exercise caution when installing this extension.