Unfugly Chrome extension icon

Unfugly

🔍 Security Report Available
👥 218 users
📦 v1.06.0
💾 199KiB
📅 2026-01-30
View on Chrome Web Store

Chrome will indicate if you already have this installed.

Overview

Revamp your Academia with a unified dashboard and Auto-generates a downloadable timetable

Tags

Make Chrome Yours/functionality tab-management make chrome yours/functionality

Privacy Practices

Not being sold to third parties, outside of the approved use cases
Not being used or transferred for purposes that are unrelated to the item's core functionality
Not being used or transferred to determine creditworthiness or for lending purposes
v1.06.0 Info Scanned Mar 1, 2026

Security Analysis — Unfugly

Analyzed v1.06.0 · Mar 1, 2026 · 5 JS files · 317 KB scanned

Permissions

storage https://academia.srmist.edu.in/* https://creatorapp.zoho.com/srm_university/* https://unfugly-backend.onrender.com/*

Code Patterns Detected

innerHTML assignment — potential XSS vector charCodeAt (obfuscation) Uses Fetch API Monitors storage changes Creates iframe elements

External Connections

academia.srmist.edu.in www.w3.org raw.githubusercontent.com unfugly-backend.onrender.com

Package Contents 21 files · 448KB

📁_metadata3KB
{}verified_contents.json3KB
📁images116KB
🖼dwnld.png3KB
🖼edit.png2KB
🖼edit1 (2).png5KB
🖼icon128.png15KB
🖼icon16.png566B
🖼icon32.png1KB
🖼icon48.png3KB
🖼share.png5KB
🖼shareqr.png81KB
📄test.txt22B
📁lib194KB
📜html2canvas.min.js194KBlarge
📄test.txt21B
📄README.md4KB
📜analytics.js1KB
📜background.js337B
📜content.js107KBlarge
📜editTimetable.js15KB
{}manifest.json1KB
🎨styles.css7KB
📄version.txt6B

What This Extension Does

The Unfugly extension, with 210 users, claims to make Chrome more customizable but lacks a description. It has access to sensitive data and network activity.

Permissions Explained

  • storageexpected: This permission allows the extension to store and retrieve data on your device.
    Technical: The extension can read and write data in Chrome's storage, potentially exposing user data if compromised. The 'storage' API provides access to local storage, which can be used for storing sensitive information such as login credentials or personal data.
  • https://academia.srmist.edu.in/*check this: This permission allows the extension to access specific websites, potentially enabling features like auto-login or data synchronization.
    Technical: The extension has access to the specified domain's resources, which may include sensitive information such as user credentials or personal data. This could be used for unauthorized access or data exfiltration if compromised. ⚠ 1
  • https://creatorapp.zoho.com/srm_university/*check this: This permission allows the extension to access specific websites, potentially enabling features like auto-login or data synchronization.
    Technical: The extension has access to the specified domain's resources, which may include sensitive information such as user credentials or personal data. This could be used for unauthorized access or data exfiltration if compromised. ⚠ 1
  • https://unfugly-backend.onrender.com/*check this: This permission allows the extension to communicate with a remote server, potentially enabling features like cloud synchronization or data backup.
    Technical: The extension can send and receive data from the specified domain's server, which may include sensitive information such as user credentials or personal data. This could be used for unauthorized access or data exfiltration if compromised. ⚠ 1

Your Data

The extension accesses storage on your device and sends data to the following domains: academia.srmist.edu.in, creatorapp.zoho.com/srm_university/, unfugly-backend.onrender.com.

Technical Details

The extension contacts these domains using HTTPS (encrypted) protocols. The exact data types exchanged are unknown without further analysis.

Code Findings

innerHTML assignment — potential XSS vectorMedium

This finding indicates that the extension may be vulnerable to cross-site scripting (XSS) attacks, which could allow malicious code to execute on your device.

Technical: The extension uses innerHTML assignment in its content script, which can lead to XSS vulnerabilities if user input is not properly sanitized. This could result in unauthorized access or data exfiltration if an attacker injects malicious code.

💡 innerHTML assignment is commonly used for dynamic content rendering in legitimate extensions.

charCodeAt (obfuscation)Medium

This finding indicates that the extension uses obfuscation techniques, which can make it harder to analyze or debug the code.

Technical: The extension uses charCodeAt() function in its JavaScript files, which is often used for string manipulation and encoding. However, in this context, it may be used for obfuscating code or hiding malicious intent.

💡 charCodeAt() is a legitimate function for string manipulation in JavaScript.

Uses Fetch APIInfo

This finding indicates that the extension uses modern web APIs to make network requests, which can improve performance and security.

Technical: The extension uses the Fetch API for making HTTP requests, which is a secure and efficient way to communicate with remote servers. However, this does not necessarily indicate any security concerns.

💡 Fetch API is commonly used in modern web applications for network requests.

Monitors storage changesMedium

This finding indicates that the extension monitors changes to your device's storage, which can be used for tracking user activity or detecting sensitive data.

Technical: The extension uses Chrome's storage API to monitor changes to local storage, which can be used for tracking user activity or detecting sensitive data. This could result in unauthorized access or data exfiltration if an attacker exploits this capability.

💡 Monitoring storage changes is commonly used in legitimate extensions for features like auto-login or data synchronization.

Creates iframe elementsMedium

This finding indicates that the extension creates iframe elements, which can be used to load external content or track user activity.

Technical: The extension uses document.createElement('iframe') in its content script, which can create new iframe elements. This could result in unauthorized access or data exfiltration if an attacker exploits this capability.

💡 Creating iframe elements is commonly used in legitimate extensions for features like auto-login or data synchronization.

Bottom Line

Based on the findings, we recommend exercising caution when using the Unfugly extension. While it has some legitimate uses, its potential vulnerabilities and data exposure raise concerns about user security. We suggest users carefully review their permissions and consider alternative extensions for customization.

The easiest way to access the Borderless Internet, Hola VPN gets you Access to the global online content you want!
Make Chrome Yours/functionality
Speed up, slow down, advance and rewind HTML5 audio/video with shortcuts
Make Chrome Yours/functionality
Skip sponsorships, subscription begging and more on YouTube videos. Report sponsors on videos you watch to save others' …
Make Chrome Yours/functionality