Endpoint Verification
🔍 Security Report Available View on Chrome Web StoreChrome will indicate if you already have this installed.
Overview
By installing this item, you agree to the Google Terms of Service and Privacy Policy at https://www.google.com/intl/en/policies/.
For more information: https://support.google.com/a/users/answer/9018161
Tags
Privacy Practices
Security Analysis — Endpoint Verification
Permissions
Code Patterns Detected
External Connections
Package Contents 38 files · 2.9MB
What This Extension Does
The Endpoint Verification extension allows Google Workspace administrators to view laptop and desktop status, including OS, device, and user information. It's designed for productivity and workflow management. With over 7 million users, it's a popular tool for IT administrators.
Permissions Explained
- cookiesexpected: This permission allows the extension to access cookies stored on your device.
Technical: The extension can read and write cookies using the chrome.cookies API. This could potentially allow unauthorized access to sensitive data if compromised. - idleexpected: This permission allows the extension to monitor your device's idle state.
Technical: The extension can use the chrome.idle API to detect when you're away from your device. This could potentially be used for malicious purposes if exploited. - nativeMessagingcheck this: This permission allows the extension to communicate with native applications on your device.
Technical: The extension uses the chrome.runtime.connectNative API to interact with native apps. This is a critical risk as it could allow unauthorized access to sensitive data if compromised. ⚠ 1 - storageexpected: This permission allows the extension to store and retrieve data on your device.
Technical: The extension uses the chrome.storage API to store and retrieve data. This could potentially be used for malicious purposes if exploited. - alarmsexpected: This permission allows the extension to schedule alarms on your device.
Technical: The extension uses the chrome.alarms API to schedule tasks. This is a medium risk as it could potentially be used for malicious purposes if exploited. - enterprise.deviceAttributescheck this: This permission allows the extension to access device attributes on your device.
Technical: The extension uses the chrome.enterprise.deviceAttributes API to access device information. This is a high risk as it could allow unauthorized access to sensitive data if compromised. ⚠ 1 - enterprise.platformKeyscheck this: This permission allows the extension to access platform keys on your device.
Technical: The extension uses the chrome.enterprise.platformKeys API to access platform keys. This is a high risk as it could allow unauthorized access to sensitive data if compromised. ⚠ 1 - gcmexpected: This permission allows the extension to use Google Cloud Messaging (GCM) on your device.
Technical: The extension uses the chrome.gcm API to send and receive messages. This is a medium risk as it could potentially be used for malicious purposes if exploited. - identityexpected: This permission allows the extension to access your identity on your device.
Technical: The extension uses the chrome.identity API to access user information. This is a medium risk as it could potentially be used for malicious purposes if exploited. - identity.emailexpected: This permission allows the extension to access your email address on your device.
Technical: The extension uses the chrome.identity API to access user information. This is a medium risk as it could potentially be used for malicious purposes if exploited. - platformKeyscheck this: This permission allows the extension to access platform keys on your device.
Technical: The extension uses the chrome.platformKeys API to access platform keys. This is a high risk as it could allow unauthorized access to sensitive data if compromised. ⚠ 1 - enterprise.reportingPrivatecheck this: This permission allows the extension to access private reporting on your device.
Technical: The extension uses the chrome.enterprise.reportingPrivate API to access private reporting. This is a high risk as it could allow unauthorized access to sensitive data if compromised. ⚠ 1 - offscreenexpected: This permission allows the extension to run in the background on your device.
Technical: The extension uses the chrome.offscreen API to run in the background. This is a medium risk as it could potentially be used for malicious purposes if exploited. - *://*.google.com/*expected: This permission allows the extension to access Google services on your device.
Technical: The extension uses the chrome.identity API to access user information. This is a medium risk as it could potentially be used for malicious purposes if exploited.
Your Data
The extension accesses device attributes, platform keys, and private reporting on your device. It also sends data to Google services, including accounts.google.com and secureconnect-pa.mtls.clients6.google.com.
Technical Details
Code Findings
The extension assigns innerHTML directly, which could potentially lead to a cross-site scripting (XSS) attack.
Technical: The extension uses the following code pattern: element.innerHTML = data;. This is a medium risk as it could allow an attacker to inject malicious scripts if exploited.
💡 This pattern is commonly used in legitimate extensions for rendering HTML content.
The extension captures keystrokes on your device, which could potentially be used to steal sensitive information.
Technical: The extension uses the following code pattern: chrome.commands.onCommand.addListener(function(command) { ... });. This is a critical risk as it allows the extension to capture keystrokes and potentially steal sensitive data if exploited.
💡 This pattern is commonly used in legitimate extensions for keyboard shortcuts.
The extension uses postMessage to communicate with other origins, which could potentially be used for malicious purposes if exploited.
Technical: The extension uses the following code pattern: window.postMessage(data);. This is a medium risk as it allows the extension to communicate with other origins and potentially exploit vulnerabilities if compromised.
💡 This pattern is commonly used in legitimate extensions for communication between web pages.
The Endpoint Verification extension has several security concerns, including a potential XSS vector, keystroke capture, and cross-origin communication. While it's designed to provide productivity and workflow management features, its permission scope exceeds what's necessary for its stated purpose. We recommend users exercise caution when installing this extension and carefully review the permissions and code behavior before granting access.