Avira Browser Safety
🔍 Security Report Available View on Chrome Web StoreChrome will indicate if you already have this installed.
Blocks malicious websites and trackers to keep your browsing private and secure, ensuring a safer online experience for you and your family. Lets you surf with confidence, knowing that Avira Browser Safety protects your personal data from unwanted eyes. Brings peace of mind to parents who want to safeguard their children's online activities.
Overview
Avira Browser Safety protects you from malicious websites & invisible trackers
Safe surfing
- Browse securely: We block over 80 million malicious sites per month.
- Shield your identity: We detect over 20 million phishing & spam attacks per month.
- Download safely: We prevent over 1 million potentially unwanted applications (PUA) from hiding in your downloads.
Private browsing
- Anti-tracking: We stop thousands of ad networks from monitoring you online.
- Optimal experience: We enable you to access all your favorite web services without interference.
Smarter searches
- Know before you go: We highlight infected sites directly in your search results.
- Anti-hijacking: We ensure you’re never redirected to malicious search engines.
Tags
Privacy Practices
Security Analysis — Avira Browser Safety
Permissions
Code Patterns Detected
External Connections
Package Contents 120 files · 5.4MB
What This Extension Does
Avira Browser Safety protects users from malicious websites, invisible trackers, and phishing attacks. It provides private browsing features, including anti-tracking and optimal experience. The extension also offers smarter searches with highlighted infected sites and anti-hijacking protection.
Permissions Explained
- tabsexpected: Allows the extension to access and interact with web pages you're visiting.
Technical: Accesses Chrome's tab management API, enabling the extension to monitor and manipulate tabs. Attack surface: moderate. - storageexpected: Lets the extension store data locally on your device.
Technical: Accesses Chrome's storage API, enabling the extension to read and write data. Attack surface: moderate. - webRequestexpected: Allows the extension to intercept and modify web requests.
Technical: Accesses Chrome's web request API, enabling the extension to inspect and manipulate HTTP requests. Attack surface: high. - cookiesexpected: Lets the extension access and modify cookies on your device.
Technical: Accesses Chrome's cookie management API, enabling the extension to read and write cookies. Attack surface: high. - unlimitedStorageexpected: Allows the extension to store an unlimited amount of data locally on your device.
Technical: Accesses Chrome's storage API with elevated permissions, enabling the extension to store large amounts of data. Attack surface: moderate. - scriptingexpected: Lets the extension execute scripts on your device.
Technical: Accesses Chrome's scripting API, enabling the extension to run JavaScript code. Attack surface: moderate. - declarativeNetRequestexpected: Allows the extension to define network requests and responses.
Technical: Accesses Chrome's declarative net request API, enabling the extension to inspect and manipulate HTTP requests. Attack surface: high. - alarmsexpected: Lets the extension schedule tasks to run at specific times.
Technical: Accesses Chrome's alarm API, enabling the extension to schedule tasks. Attack surface: low. - webNavigationexpected: Allows the extension to monitor and interact with web page navigation.
Technical: Accesses Chrome's web navigation API, enabling the extension to inspect and manipulate web page navigation. Attack surface: moderate. - managementexpected: Lets the extension manage other extensions on your device.
Technical: Accesses Chrome's management API, enabling the extension to inspect and modify other extensions. Attack surface: high. - <all_urls>check this: Allows the extension to access all web pages you visit.
Technical: Accesses Chrome's URL pattern matching API, enabling the extension to inspect and manipulate all web requests. Attack surface: critical. ⚠ 1
Your Data
The extension accesses cookies on your device and sends data to various domains, including www.avira.com, github.com, adguard.com, and others. It also makes XHR requests and uses the Fetch API.
Technical Details
Code Findings
The extension uses the function constructor to execute code dynamically, which can be a potential security risk.
Technical: Code pattern: new Function('code'). Risk vector: arbitrary code execution. Exploit scenario: malicious code injection via crafted input.
💡 Legitimate extensions may use dynamic code execution for legitimate purposes, such as loading external scripts or handling user input.
The extension loads external scripts in its service worker, which can be a potential security risk if the scripts are malicious.
Technical: Code pattern: importScripts('script_url'). Risk vector: arbitrary code execution. Exploit scenario: malicious script injection via crafted input.
💡 Legitimate extensions may load external scripts for legitimate purposes, such as loading dependencies or handling user input.
The extension uses innerHTML assignment to set the content of an HTML element, which can be a potential XSS risk if the content is not properly sanitized.
Technical: Code pattern: element.innerHTML = 'content'. Risk vector: cross-site scripting (XSS). Exploit scenario: malicious script injection via crafted input.
💡 Legitimate extensions may use innerHTML assignment for legitimate purposes, such as rendering user-generated content or loading external scripts.
The extension uses String.fromCharCode to obfuscate code, which can make it harder to analyze and understand the code's behavior.
Technical: Code pattern: String.fromCharCode(0x01). Risk vector: code obfuscation. Exploit scenario: malicious code injection via crafted input.
💡 Legitimate extensions may use code obfuscation for legitimate purposes, such as protecting proprietary code or reducing code size.
The extension makes XHR requests to various domains, which can be used to fetch data from external sources.
Technical: Code pattern: XMLHttpRequest. Risk vector: data exposure. Exploit scenario: malicious data injection via crafted input.
💡 Legitimate extensions may make XHR requests for legitimate purposes, such as fetching user data or loading external scripts.
The extension uses the Fetch API to fetch data from external sources, which can be used for legitimate purposes such as loading external scripts or fetching user data.
Technical: Code pattern: fetch('url'). Risk vector: data exposure. Exploit scenario: malicious data injection via crafted input.
💡 Legitimate extensions may use the Fetch API for legitimate purposes, such as loading external scripts or fetching user data.
The extension creates script elements dynamically, which can be a potential security risk if the scripts are malicious.
Technical: Code pattern: document.createElement('script'). Risk vector: arbitrary code execution. Exploit scenario: malicious script injection via crafted input.
💡 Legitimate extensions may create script elements dynamically for legitimate purposes, such as loading external scripts or handling user input.
The extension reads data from browser storage, which can be used to store and retrieve user data.
Technical: Code pattern: chrome.storage. Risk vector: data exposure. Exploit scenario: malicious data injection via crafted input.
💡 Legitimate extensions may read browser storage for legitimate purposes, such as storing user preferences or loading external scripts.
The extension removes data from browser storage, which can be used to clear user data.
Technical: Code pattern: chrome.storage.remove. Risk vector: data exposure. Exploit scenario: malicious data injection via crafted input.
💡 Legitimate extensions may remove data from browser storage for legitimate purposes, such as clearing user preferences or loading external scripts.
The extension accesses and modifies cookies on your device, which can be a potential security risk if the cookies are malicious.
Technical: Code pattern: document.cookie. Risk vector: arbitrary code execution. Exploit scenario: malicious cookie injection via crafted input.
💡 Legitimate extensions may access and modify cookies for legitimate purposes, such as storing user preferences or loading external scripts.
The extension contains a potential hardcoded secret, which can be used to access sensitive data or perform malicious actions.
Technical: Code pattern: secret_key. Risk vector: data exposure. Exploit scenario: malicious data injection via crafted input.
💡 Legitimate extensions may contain hardcoded secrets for legitimate purposes, such as authenticating with external services or loading proprietary code.
The extension creates iframe elements dynamically, which can be used to load external content or handle user input.
Technical: Code pattern: document.createElement('iframe'). Risk vector: data exposure. Exploit scenario: malicious data injection via crafted input.
💡 Legitimate extensions may create iframe elements for legitimate purposes, such as loading external scripts or handling user input.
The extension sets up event listeners to handle user interactions and other events.
Technical: Code pattern: element.addEventListener. Risk vector: data exposure. Exploit scenario: malicious data injection via crafted input.
💡 Legitimate extensions may set up event listeners for legitimate purposes, such as handling user input or loading external scripts.
The Avira Browser Safety extension provides a range of security features to protect users from malicious websites and invisible trackers. However, it also accesses sensitive data and makes XHR requests to various domains, which can be a potential security risk if the data or scripts are malicious. Users should exercise caution when installing this extension and regularly review its permissions and behavior to ensure their safety.