Transfer of Ownership
Flag items where ownership has been transferred to a different publisher, which may indicate compromise or changes in trustworthiness.
Flag items where ownership has been transferred to a different publisher, which may indicate compromise or changes in trustworthiness.
Flags items published by entities that haven’t gone through the publisher verification process of the marketplace. Lack of verification may indicate higher risk, as the publisher’s identity and trustworthiness are unconfirmed.
Flags items lacking installs on the marketplace, suggesting concerns about the extension's reputation and the publisher's reliability.
AI-powered analysis of the extension's source code for security insights and risk assessment.
The extension "星联助手-tiktok达人建联邀约工具" is designed to automate interactions with TikTok influencers. It facilitates sending invitations, direct messages, and promotional content efficiently, aiming to reduce time costs and improve connection efficiency for businesses.
Event Listeners and User Interaction:
chrome.action.onClicked and chrome.tabs.sendMessage to communicate with content scripts.Network Requests:
chrome.webRequest.onBeforeSendHeaders.Tab Management:
chrome.tabs.create and chrome.tabs.update to manage tab navigation.Debugger and Script Execution:
chrome.scripting.executeScript for DOM manipulation and interaction.User Interaction Simulation:
chrome.debugger.sendCommand to dispatch mouse events.Error Handling and Logging:
console.log for debugging and tracking execution flow.try-catch blocks and logs errors for further analysis.The extension primarily focuses on automating interactions with TikTok's platform to streamline influencer outreach. It uses standard Chrome extension APIs for tab management, network monitoring, and script execution. The code includes robust error handling and logging mechanisms to ensure reliability and ease of debugging.
API calls detected through static analysis of the source code. For more accurate insights, explore our sandbox dynamic analysis.
Any encoded/decoded secrets we managed to find in the source code, git repository, or related files
Known vulnerabilities and security issues detected in the extension's dependencies and code.
Any identifiers we detected that may indicate external communication from the item's code
Dependencies and third-party libraries used by the extension, including version information and license details.