e7aaea682e6cc76a014162301a2793f9d5159134ae2c425448cadb40936cd58f
fa0659ef21239bdd2e1e79504574a000021dc1bf0ec35ec4b25a14468e6d9144
2d46e76deb75740c085fef5daf7738cb609b02520e846cba506a29189c7bc871
<all_urls> access - can read and modify data on ALL websites you visit!
Permission Scope: ALL_WEBSITES
Risk Level: HIGH
Host Permissions
1
Content Scripts
3
Sensitive Categories
0
Sensitive Domains
0
Risk Factors
[!] Has
Sample Host Permissions
Showing 1 of 1 host permission(s) requested by this extension:
Full access to ALL websites on the internet
Risk: CRITICAL | Category: all_urls
Show unknown domains
www.dcuniverse.com*.hulu.comlocal.getmetastream.comdeveloper.chrome.comwww.disneyplus.com*.netflix.com*.twitch.tvapp.getmetastream.com
All URLs discovered in scripts and manifest (27)
| URL | Host | Source | Location |
|---|---|---|---|
| https://app.getmetastream.com | app.getmetastream.com | JS code | background.js:64 |
| http://local.getmetastream.com | local.getmetastream.com | JS code | background.js:67 |
| https://local.getmetastream.com | local.getmetastream.com | JS code | background.js:68 |
| http://localhost:8080 | localhost | JS code | background.js:69 |
| https://localhost:8080 | localhost | JS code | background.js:70 |
| https://developer.chrome.com/extensions/match_patterns | developer.chrome.com | JS code | background.js:93 |
| https://www.dcuniverse.com/* | www.dcuniverse.com | JS code | background.js:187 |
| https://docs.google.com/* | docs.google.com | JS code | background.js:191 |
| https://drive.google.com/* | drive.google.com | JS code | background.js:191 |
| https://www.disneyplus.com/* | www.disneyplus.com | JS code | background.js:195 |
| http://localhost:8080/#?${params.toString( | localhost | JS code | background.js:821 |
| https://clients2.google.com/service/update2/crx | clients2.google.com | manifest | manifest.json |
| https://app.getmetastream.com | — | external_scripts | background.js:64 |
| http://local.getmetastream.com | — | external_scripts | background.js:67 |
| https://local.getmetastream.com | — | external_scripts | background.js:68 |
| http://localhost:8080 | — | external_scripts | background.js:69 |
| https://localhost:8080 | — | external_scripts | background.js:70 |
| https://developer.chrome.com/extensions/match_patterns | — | external_scripts | background.js:93 |
| https://*.netflix.com/* | — | external_scripts | background.js:178 |
| https://*.hulu.com/* | — | external_scripts | background.js:183 |
| https://www.dcuniverse.com/* | — | external_scripts | background.js:187 |
| https://docs.google.com/* | — | external_scripts | background.js:191 |
| https://drive.google.com/* | — | external_scripts | background.js:191 |
| https://www.disneyplus.com/* | — | external_scripts | background.js:195 |
| https://*.twitch.tv/* | — | external_scripts | background.js:199 |
| http://localhost:8080/#?${params.toString()}` | — | external_scripts | background.js:821 |
| https://*/* | — | external_scripts | background.js:856 |
✓ Clean / Unknown (11)
| Domain | Source | Domain Intel | VirusTotal |
|---|---|---|---|
| *.hulu.com | JS code | BENIGN (Unknown but no indicators) | 0 malicious, 0 suspicious, 0 harmless |
| *.netflix.com | JS code | BENIGN (Unknown but no indicators) | 0 malicious, 0 suspicious, 0 harmless |
| *.twitch.tv | JS code | BENIGN (Unknown but no indicators) | 0 malicious, 0 suspicious, 0 harmless |
| app.getmetastream.com | JS codeURL in code | BENIGN (Unknown but no indicators) | 0 malicious, 0 suspicious, 0 harmless |
| clients2.google.com | manifest | BENIGN (Legitimate Infrastructure) | Not scanned |
| developer.chrome.com | JS codeURL in code | BENIGN (Unknown but no indicators) | 0 malicious, 0 suspicious, 0 harmless |
| docs.google.com | JS codeURL in code | BENIGN (Legitimate Infrastructure) | Not scanned |
| drive.google.com | JS codeURL in code | BENIGN (Legitimate Infrastructure) | Not scanned |
| local.getmetastream.com | JS codeURL in code | BENIGN (Unknown but no indicators) | 0 malicious, 0 suspicious, 0 harmless |
| www.dcuniverse.com | JS codeURL in code | BENIGN (Unknown but no indicators) | 0 malicious, 0 suspicious, 0 harmless |
| www.disneyplus.com | JS codeURL in code | BENIGN (Unknown but no indicators) | 0 malicious, 0 suspicious, 0 harmless |
Total Findings: 1 (1 critical, 0 high)
Analysis: Advanced behavioral analysis completed
⛔ CSP Manipulation Attack Detected
Removes Content-Security-Policy headers to enable remote code injection. This is a high-risk technique associated with malicious extensions.
DYNAMIC_CSP_REMOVAL
Severity: CRITICAL
Impact: Runtime CSP bypass for remote code injection
Evidence: background.js
IMMEDIATE REMOVAL REQUIRED
Attribution Confidence: NONE
No confirmed attribution to known campaigns
✓ No confirmed attribution to known threat campaigns based on OSINT research.
This does not mean the extension is safe - it may be a new campaign, unpublished threat, or benign software.
Continue with technical analysis to determine actual risk.
Ollama assessment was not run. Re-run the analyzer with the --ollama flag (and ensure Ollama is running) to include an LLM security assessment in this report.
First Analyzed: 2026-04-21T06:15:47.336592+00:00
Previous Risk Score: 8.5/10
This is a local analysis record, not an external threat intelligence source.
Previously Flagged Domains
Flagged Domains: 0
Dangerous Permissions:
- webRequest
Dangerous Permissions
Dangerous Permission Combinations Detected
These permission combinations indicate potential malicious capabilities:
tabs + storage
webRequest + <all_urls>
scripting + <all_urls>